๐Ÿ” CVE Alert

CVE-2024-49568

UNKNOWN 0.0

net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg When receiving proposal msg in server, the fields v2_ext_offset/ eid_cnt/ism_gid_cnt in proposal msg are from the remote client and can not be fully trusted. Especially the field v2_ext_offset, once exceed the max value, there has the chance to access wrong address, and crash may happen. This patch checks the fields v2_ext_offset/eid_cnt/ism_gid_cnt before using them.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 11, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8c3dca341aea885249e08856c4380300b75d2cf5 < 295a92e3df32e72aff0f4bc25c310e349d07ffbf 8c3dca341aea885249e08856c4380300b75d2cf5 < 42f6beb2d5779429417b5f8115a4e3fa695d2a6c 8c3dca341aea885249e08856c4380300b75d2cf5 < 7863c9f3d24ba49dbead7e03dfbe40deb5888fdf
Linux / Linux
5.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/295a92e3df32e72aff0f4bc25c310e349d07ffbf git.kernel.org: https://git.kernel.org/stable/c/42f6beb2d5779429417b5f8115a4e3fa695d2a6c git.kernel.org: https://git.kernel.org/stable/c/7863c9f3d24ba49dbead7e03dfbe40deb5888fdf