In the Linux kernel, the following vulnerability has been resolved:
net/smc: check v2extoffset/eidcnt/ismgid_cnt when receiving proposal msg
When receiving proposal msg in server, the fields v2extoffset/ eidcnt/ismgidcnt in proposal msg are from the remote client and can not be fully trusted. Especially the field v2ext_offset, once exceed the max value, there has the chance to access wrong address, and crash may happen.
This patch checks the fields v2extoffset/eidcnt/ismgid_cnt before using them.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49568.json",
"cna_assigner": "Linux"
}