CVE-2024-57938
net/sctp: Prevent autoclose integer overflow in sctp_association_init()
CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: net/sctp: Prevent autoclose integer overflow in sctp_association_init() While by default max_autoclose equals to INT_MAX / HZ, one may set net.sctp.max_autoclose to UINT_MAX. There is code in sctp_association_init() that can consequently trigger overflow.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jan 21, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new medium vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
9f70f46bd4c7267d48ef461a1d613ec9ec0d520c < 94b7ed0a4896420988e1776942f0a3f67167873e 9f70f46bd4c7267d48ef461a1d613ec9ec0d520c < 081bdb3a31674339313c6d702af922bc29de2c53 9f70f46bd4c7267d48ef461a1d613ec9ec0d520c < f9c3adb083d3278f065a83c3f667f1246c74c31f 9f70f46bd4c7267d48ef461a1d613ec9ec0d520c < 7af63ef5fe4d480064eb22583b24ffc8b408183a 9f70f46bd4c7267d48ef461a1d613ec9ec0d520c < 271f031f4c31c07e2a85a1ba2b4c8e734909a477 9f70f46bd4c7267d48ef461a1d613ec9ec0d520c < 2297890b778b0e7c8200d6818154f7e461d78e94 9f70f46bd4c7267d48ef461a1d613ec9ec0d520c < 4e86729d1ff329815a6e8a920cb554a1d4cb5b8d
Linux / Linux
3.13
References
git.kernel.org: https://git.kernel.org/stable/c/94b7ed0a4896420988e1776942f0a3f67167873e git.kernel.org: https://git.kernel.org/stable/c/081bdb3a31674339313c6d702af922bc29de2c53 git.kernel.org: https://git.kernel.org/stable/c/f9c3adb083d3278f065a83c3f667f1246c74c31f git.kernel.org: https://git.kernel.org/stable/c/7af63ef5fe4d480064eb22583b24ffc8b408183a git.kernel.org: https://git.kernel.org/stable/c/271f031f4c31c07e2a85a1ba2b4c8e734909a477 git.kernel.org: https://git.kernel.org/stable/c/2297890b778b0e7c8200d6818154f7e461d78e94 git.kernel.org: https://git.kernel.org/stable/c/4e86729d1ff329815a6e8a920cb554a1d4cb5b8d lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html