CVE-2024-57938

Source
https://cve.org/CVERecord?id=CVE-2024-57938
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57938.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-57938
Downstream
Related
Published
2025-01-21T12:09:15.412Z
Modified
2026-03-20T12:39:57.470908Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
net/sctp: Prevent autoclose integer overflow in sctp_association_init()
Details

In the Linux kernel, the following vulnerability has been resolved:

net/sctp: Prevent autoclose integer overflow in sctpassociationinit()

While by default maxautoclose equals to INTMAX / HZ, one may set net.sctp.maxautoclose to UINTMAX. There is code in sctpassociationinit() that can consequently trigger overflow.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57938.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9f70f46bd4c7267d48ef461a1d613ec9ec0d520c
Fixed
94b7ed0a4896420988e1776942f0a3f67167873e
Fixed
081bdb3a31674339313c6d702af922bc29de2c53
Fixed
f9c3adb083d3278f065a83c3f667f1246c74c31f
Fixed
7af63ef5fe4d480064eb22583b24ffc8b408183a
Fixed
271f031f4c31c07e2a85a1ba2b4c8e734909a477
Fixed
2297890b778b0e7c8200d6818154f7e461d78e94
Fixed
4e86729d1ff329815a6e8a920cb554a1d4cb5b8d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57938.json"