{"id":"CVE-2024-53118","summary":"vsock: Fix sk_error_queue memory leak","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Fix sk_error_queue memory leak\n\nKernel queues MSG_ZEROCOPY completion notifications on the error queue.\nWhere they remain, until explicitly recv()ed. To prevent memory leaks,\nclean up the queue when the socket is destroyed.\n\nunreferenced object 0xffff8881028beb00 (size 224):\n  comm \"vsock_test\", pid 1218, jiffies 4294694897\n  hex dump (first 32 bytes):\n    90 b0 21 17 81 88 ff ff 90 b0 21 17 81 88 ff ff  ..!.......!.....\n    00 00 00 00 00 00 00 00 00 b0 21 17 81 88 ff ff  ..........!.....\n  backtrace (crc 6c7031ca):\n    [\u003cffffffff81418ef7\u003e] kmem_cache_alloc_node_noprof+0x2f7/0x370\n    [\u003cffffffff81d35882\u003e] __alloc_skb+0x132/0x180\n    [\u003cffffffff81d2d32b\u003e] sock_omalloc+0x4b/0x80\n    [\u003cffffffff81d3a8ae\u003e] msg_zerocopy_realloc+0x9e/0x240\n    [\u003cffffffff81fe5cb2\u003e] virtio_transport_send_pkt_info+0x412/0x4c0\n    [\u003cffffffff81fe6183\u003e] virtio_transport_stream_enqueue+0x43/0x50\n    [\u003cffffffff81fe0813\u003e] vsock_connectible_sendmsg+0x373/0x450\n    [\u003cffffffff81d233d5\u003e] ____sys_sendmsg+0x365/0x3a0\n    [\u003cffffffff81d246f4\u003e] ___sys_sendmsg+0x84/0xd0\n    [\u003cffffffff81d26f47\u003e] __sys_sendmsg+0x47/0x80\n    [\u003cffffffff820d3df3\u003e] do_syscall_64+0x93/0x180\n    [\u003cffffffff8220012b\u003e] entry_SYSCALL_64_after_hwframe+0x76/0x7e","modified":"2026-04-02T12:22:50.104224Z","published":"2024-12-02T13:44:49.658Z","related":["SUSE-SU-2025:0117-1","SUSE-SU-2025:0153-1","SUSE-SU-2025:0154-1","SUSE-SU-2025:0289-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7276-1","USN-7277-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53118.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/bea4779a45f49275b1e1b1bd9de03cd3727244d8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fbf7085b3ad1c7cc0677834c90f985f1b4f77a33"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53118.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53118"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"581512a6dc939ef122e49336626ae159f3b8a345"},{"fixed":"bea4779a45f49275b1e1b1bd9de03cd3727244d8"},{"fixed":"fbf7085b3ad1c7cc0677834c90f985f1b4f77a33"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53118.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}