CVE-2024-49944

Source
https://cve.org/CVERecord?id=CVE-2024-49944
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49944.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-49944
Downstream
Related
Published
2024-10-21T18:02:02.457Z
Modified
2026-03-20T12:38:10.709208Z
Summary
sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start
Details

In the Linux kernel, the following vulnerability has been resolved:

sctp: set skstate back to CLOSED if autobind fails in sctplisten_start

In sctplistenstart() invoked by sctpinetlisten(), it should set the skstate back to CLOSED if sctpautobind() fails due to whatever reason.

Otherwise, next time when calling sctpinetlisten(), if sctpsk(sk)->reuse is already set via setsockopt(SCTPREUSEPORT), sctpsk(sk)->bindhash will be dereferenced as skstate is LISTENING, which causes a crash as bind_hash is NULL.

KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] RIP: 0010:sctpinetlisten+0x7f0/0xa20 net/sctp/socket.c:8617 Call Trace: <TASK> __syslistensocket net/socket.c:1883 [inline] __sys_listen+0x1b7/0x230 net/socket.c:1894 __dosyslisten net/socket.c:1902 [inline]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49944.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5e8f3f703ae4e4af65e2695e486b3cd198328863
Fixed
89bbead9d897c77d0b566349c8643030ff2abeba
Fixed
0e4e2e60556c6ed00e8450b720f106a268d23062
Fixed
dd70c8a89ef99c3d53127fe19e51ef47c3f860fa
Fixed
e7a8442195e8ebd97df467ce4742980ab57edcce
Fixed
9230a59eda0878d7ecaa901d876aec76f57bd455
Fixed
7f64cb5b4d8c872296eda0fdce3bcf099eec7aa7
Fixed
f032e1dac30b3376c7d6026fb01a8c403c47a80d
Fixed
e914bf68dab88815a7ae7b7a3a5e8913c8ff14a5
Fixed
8beee4d8dee76b67c75dc91fd8185d91e845c160

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49944.json"