Skip to main content

CVE-2024-35908: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35908cvecve-2024-35908
Published: Sun May 19 2024 (05/19/2024, 08:35:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: tls: get psock ref after taking rxlock to avoid leak At the start of tls_sw_recvmsg, we take a reference on the psock, and then call tls_rx_reader_lock. If that fails, we return directly without releasing the reference. Instead of adding a new label, just take the reference after locking has succeeded, since we don't need it before.

AI-Powered Analysis

AILast updated: 06/29/2025, 08:09:29 UTC

Technical Analysis

CVE-2024-35908 is a vulnerability identified in the Linux kernel's TLS (Transport Layer Security) implementation, specifically within the function tls_sw_recvmsg. The issue arises from improper reference management of the 'psock' (presumably a pointer to a socket structure) during the receive message operation. Initially, the kernel code takes a reference on the psock before acquiring the rxlock (receive lock) via tls_rx_reader_lock. If the lock acquisition fails, the function returns immediately without releasing the previously taken reference, leading to a reference leak. This leak could cause resource exhaustion or memory management inconsistencies over time. The fix involves changing the code logic to take the psock reference only after successfully acquiring the rxlock, ensuring that no references are held if the lock is not obtained. This correction prevents the leak by aligning reference counting with lock acquisition, maintaining kernel stability and resource integrity. The vulnerability affects certain Linux kernel versions identified by specific commit hashes, and no known exploits are reported in the wild as of the publication date (May 19, 2024). No CVSS score has been assigned yet, and the vulnerability does not appear to be directly exploitable for privilege escalation or remote code execution but could degrade system reliability if left unpatched.

Potential Impact

For European organizations relying on Linux-based systems, especially those using kernel versions affected by this vulnerability, the primary impact is on system stability and resource management. The reference leak could lead to gradual resource exhaustion, potentially causing degraded performance, denial of service, or kernel crashes in environments with high TLS traffic or heavy socket usage. This is particularly relevant for data centers, cloud providers, telecom operators, and enterprises running critical infrastructure on Linux servers. While the vulnerability does not directly compromise confidentiality or integrity, the availability of services could be impacted if the leak leads to system instability. Organizations with high uptime requirements or those operating in sectors such as finance, healthcare, or government services may experience operational disruptions if the vulnerability is exploited indirectly through resource depletion. Since no known exploits exist yet, the immediate risk is low, but the vulnerability should be addressed proactively to prevent future exploitation or accidental system failures.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the issue is related to kernel code, applying official Linux kernel updates or vendor-provided patches is the most effective mitigation. For environments where immediate patching is not feasible, monitoring system resource usage, particularly socket references and memory consumption related to TLS operations, can help detect abnormal behavior early. Implementing kernel hardening and resource limits may reduce the impact of potential leaks. Additionally, organizations should audit their TLS-dependent applications and services to ensure they handle socket connections efficiently and restart services periodically to clear leaked references if patching is delayed. Engaging with Linux distribution vendors for timely security updates and testing patches in staging environments before production deployment is recommended. Finally, maintaining comprehensive logging and alerting on kernel errors or unusual socket behavior can aid in early detection of issues stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.121Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe2144

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 8:09:29 AM

Last updated: 8/16/2025, 8:12:35 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats