In the Linux kernel, the following vulnerability has been resolved:
net/smc: check v2extoffset/eidcnt/ismgid_cnt when receiving proposal msg
When receiving proposal msg in server, the fields v2extoffset/ eidcnt/ismgidcnt in proposal msg are from the remote client and can not be fully trusted. Especially the field v2ext_offset, once exceed the max value, there has the chance to access wrong address, and crash may happen.
This patch checks the fields v2extoffset/eidcnt/ismgid_cnt before using them.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49568.json"
}[
{
"digest": {
"length": 1336.0,
"function_hash": "1870292945537675156512157701112626631"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2024-49568-0345f9c4",
"target": {
"function": "smc_find_rdma_v2_device_serv",
"file": "net/smc/af_smc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@295a92e3df32e72aff0f4bc25c310e349d07ffbf"
},
{
"digest": {
"length": 298.0,
"function_hash": "177703179572212957664810212119129815142"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2024-49568-06620049",
"target": {
"function": "smc_get_clc_v2_ext",
"file": "net/smc/smc_clc.h"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@295a92e3df32e72aff0f4bc25c310e349d07ffbf"
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"67351709616596157418342034455617755434",
"213278234263678131731520466084788674999",
"236012483255719910565828676519813475738",
"225703758986821659765555943542567274527",
"109144583777346978687084157564526833059",
"265069641545940594345877357650531192127",
"193337372881893928347067545108765690456",
"165863723098329556814490723680095629860"
]
},
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2024-49568-2191adc4",
"target": {
"file": "net/smc/smc_clc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@295a92e3df32e72aff0f4bc25c310e349d07ffbf"
},
{
"digest": {
"length": 964.0,
"function_hash": "90145872051921243289566070249933143197"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2024-49568-3193ca93",
"target": {
"function": "smc_clc_msg_prop_valid",
"file": "net/smc/smc_clc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@295a92e3df32e72aff0f4bc25c310e349d07ffbf"
},
{
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"230766815980930256013937285471475335453",
"207295028667246676704957027111654058186",
"19792493122386602875412571278492523568",
"320327425251530727183973927616921274568",
"23513149253462693268306395363539126549"
]
},
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2024-49568-ecfc525f",
"target": {
"file": "net/smc/smc_clc.h"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@295a92e3df32e72aff0f4bc25c310e349d07ffbf"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"109345278224930133096903002835514984580",
"138079280322008621682742913211087418572",
"280766311058817991533186329014816248016",
"108491298748715497869140300071559811953"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2024-49568-f960218c",
"target": {
"file": "net/smc/af_smc.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@295a92e3df32e72aff0f4bc25c310e349d07ffbf"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49568.json"