CVE-2024-47408
net/smc: check smcd_v2_ext_offset when receiving proposal msg
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: net/smc: check smcd_v2_ext_offset when receiving proposal msg When receiving proposal msg in server, the field smcd_v2_ext_offset in proposal msg is from the remote client and can not be fully trusted. Once the value of smcd_v2_ext_offset exceed the max value, there has the chance to access wrong address, and crash may happen. This patch checks the value of smcd_v2_ext_offset before using it.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jan 11, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
5c21c4ccafe85906db809de3af391fd434df8a27 < a36364d8d4fabb105001f992fb8ff2d3546203d6 5c21c4ccafe85906db809de3af391fd434df8a27 < e1cc8be2a785a8f1ce1f597f3e608602c5fccd46 5c21c4ccafe85906db809de3af391fd434df8a27 < 935caf324b445fe73d7708fae6f7176fb243f357 5c21c4ccafe85906db809de3af391fd434df8a27 < 48d5a8a304a643613dab376a278f29d3e22f7c34 5c21c4ccafe85906db809de3af391fd434df8a27 < 9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad
Linux / Linux
5.10
References
git.kernel.org: https://git.kernel.org/stable/c/a36364d8d4fabb105001f992fb8ff2d3546203d6 git.kernel.org: https://git.kernel.org/stable/c/e1cc8be2a785a8f1ce1f597f3e608602c5fccd46 git.kernel.org: https://git.kernel.org/stable/c/935caf324b445fe73d7708fae6f7176fb243f357 git.kernel.org: https://git.kernel.org/stable/c/48d5a8a304a643613dab376a278f29d3e22f7c34 git.kernel.org: https://git.kernel.org/stable/c/9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html