CVE-2024-53124Race Condition in Linux

CWE-362Race Condition86 documents7 sources
Severity
4.7MEDIUMNVD
OSV7.8OSV5.9OSV5.5
EPSS
0.0%
top 97.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 2
Latest updateDec 16

Description

In the Linux kernel, the following vulnerability has been resolved: net: fix data-races around sk->sk_forward_alloc Syzkaller reported this warning: ------------[ cut here ]------------ WARNING: CPU: 0 PID: 16 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x1c5/0x1e0 Modules linked in: CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.12.0-rc5 #26 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 RIP: 0010:inet_sock_destruct+0x1c5/0x1e0 Code: 24 12 4c 89 e2 5b

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6

Affected Packages10 packages

Patches

🔴Vulnerability Details

43
OSV
linux-azure-fips vulnerabilities2025-12-16
OSV
linux-oracle vulnerabilities2025-11-19
OSV
linux-fips vulnerabilities2025-11-10
OSV
linux-azure, linux-azure-4.15 vulnerabilities2025-11-07
OSV
linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities2025-11-06

📋Vendor Advisories

42
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2025-12-16
Ubuntu
Linux kernel (Oracle) vulnerabilities2025-11-19
Ubuntu
Linux kernel (FIPS) vulnerabilities2025-11-10
Ubuntu
Linux kernel (Azure) vulnerabilities2025-11-07
Ubuntu
Linux kernel vulnerabilities2025-11-06