CVE-2024-49568

Source
https://cve.org/CVERecord?id=CVE-2024-49568
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49568.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-49568
Downstream
Related
Published
2025-01-11T12:35:36.190Z
Modified
2026-03-20T12:39:22.001110Z
Summary
net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg
Details

In the Linux kernel, the following vulnerability has been resolved:

net/smc: check v2extoffset/eidcnt/ismgid_cnt when receiving proposal msg

When receiving proposal msg in server, the fields v2extoffset/ eidcnt/ismgidcnt in proposal msg are from the remote client and can not be fully trusted. Especially the field v2ext_offset, once exceed the max value, there has the chance to access wrong address, and crash may happen.

This patch checks the fields v2extoffset/eidcnt/ismgid_cnt before using them.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49568.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8c3dca341aea885249e08856c4380300b75d2cf5
Fixed
295a92e3df32e72aff0f4bc25c310e349d07ffbf
Fixed
42f6beb2d5779429417b5f8115a4e3fa695d2a6c
Fixed
7863c9f3d24ba49dbead7e03dfbe40deb5888fdf

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49568.json"