In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix handling of received connection abort
Fix the handling of a connection abort that we've received. Though the abort is at the connection level, it needs propagating to the calls on that connection. Whilst the propagation bit is performed, the calls aren't then woken up to go and process their termination, and as no further input is forthcoming, they just hang.
Also add some tracing for the logging of connection aborts.
[
{
"id": "CVE-2024-58053-14e69af5",
"target": {
"file": "net/rxrpc/conn_event.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"327280673581719654189619893464517168717",
"137119970680114860725386213305669525792",
"278904940852298201145464626221842228075",
"136510978269708405034469193957575133492",
"186943075443763878887358128419321702614",
"45318899123250621283060693545618614101",
"112016453568759704751990498932804818486",
"201052468616022667233732071080300226982",
"210575652487660675720447544402516901933",
"128391501336338745536623803966441655372",
"336374532917817669895129638094359840405",
"284787026853201133689563079497807744196",
"325132494353613041641130418783617397025",
"96834312777644151159661266008028699745",
"259384447540360787159762087454424091974",
"104926974814235774433862386462077579611"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5842ce7b120c65624052a8da04460d35b26caac0",
"signature_version": "v1"
},
{
"id": "CVE-2024-58053-30353427",
"target": {
"file": "net/rxrpc/conn_event.c",
"function": "rxrpc_abort_calls"
},
"digest": {
"length": 337.0,
"function_hash": "93927881008684342875631745173762089255"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5842ce7b120c65624052a8da04460d35b26caac0",
"signature_version": "v1"
},
{
"id": "CVE-2024-58053-91bee2e6",
"target": {
"file": "include/trace/events/rxrpc.h"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"332438688217954757787416390323128615357",
"317815679954306375274335829596489093322",
"213177451543338940976195832411921400208",
"84786696816188505265854544294850717026",
"329181792665525077547082962243997361875",
"40284696110446712576052895243871631875",
"222129822863814767107554208756745336553",
"46021576007679596730428112009480268747",
"69594731274708114090827504671010811296",
"244332191666667497807431871197510467476",
"241931628771941745066765175187864341430"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c6702260557c0183d8417c79a37777a3d3e58e8",
"signature_version": "v1"
},
{
"id": "CVE-2024-58053-982d6e13",
"target": {
"file": "net/rxrpc/conn_event.c",
"function": "rxrpc_input_conn_abort"
},
"digest": {
"length": 162.0,
"function_hash": "173495030507145795276280252344610030243"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5842ce7b120c65624052a8da04460d35b26caac0",
"signature_version": "v1"
},
{
"id": "CVE-2024-58053-9935ed91",
"target": {
"file": "net/rxrpc/conn_event.c",
"function": "rxrpc_abort_calls"
},
"digest": {
"length": 337.0,
"function_hash": "93927881008684342875631745173762089255"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c6702260557c0183d8417c79a37777a3d3e58e8",
"signature_version": "v1"
},
{
"id": "CVE-2024-58053-dbf04602",
"target": {
"file": "include/trace/events/rxrpc.h"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"332438688217954757787416390323128615357",
"317815679954306375274335829596489093322",
"213177451543338940976195832411921400208",
"147503419740541020684656524514800370271",
"329181792665525077547082962243997361875",
"40284696110446712576052895243871631875",
"222129822863814767107554208756745336553",
"46021576007679596730428112009480268747",
"69594731274708114090827504671010811296",
"244332191666667497807431871197510467476",
"241931628771941745066765175187864341430"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5842ce7b120c65624052a8da04460d35b26caac0",
"signature_version": "v1"
},
{
"id": "CVE-2024-58053-e967ea90",
"target": {
"file": "net/rxrpc/conn_event.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"327280673581719654189619893464517168717",
"137119970680114860725386213305669525792",
"278904940852298201145464626221842228075",
"136510978269708405034469193957575133492",
"186943075443763878887358128419321702614",
"45318899123250621283060693545618614101",
"112016453568759704751990498932804818486",
"201052468616022667233732071080300226982",
"210575652487660675720447544402516901933",
"128391501336338745536623803966441655372",
"336374532917817669895129638094359840405",
"284787026853201133689563079497807744196",
"325132494353613041641130418783617397025",
"96834312777644151159661266008028699745",
"259384447540360787159762087454424091974",
"104926974814235774433862386462077579611"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c6702260557c0183d8417c79a37777a3d3e58e8",
"signature_version": "v1"
},
{
"id": "CVE-2024-58053-f463c1bd",
"target": {
"file": "net/rxrpc/conn_event.c",
"function": "rxrpc_input_conn_abort"
},
"digest": {
"length": 162.0,
"function_hash": "173495030507145795276280252344610030243"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c6702260557c0183d8417c79a37777a3d3e58e8",
"signature_version": "v1"
}
]