Wind River Support Network

HomeDefectsLIN1024-6371
Acknowledged

LIN1024-6371 : Security Advisory - linux - CVE-2024-57791

Created: Jan 12, 2025    Updated: Jan 15, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:

net/smc: check return value of sock_recvmsg when draining clc data

When receiving clc msg, the field length in smc_clc_msg_hdr indicates the
length of msg should be received from network and the value should not be
fully trusted as it is from the network. Once the value of length exceeds
the value of buflen in function smc_clc_wait_msg it may run into deadloop
when trying to drain the remaining data exceeding buflen.

This patch checks the return value of sock_recvmsg when draining data in
case of deadloop in draining.

CREATE(Triage):(User=admin) CVE-2024-57791 (https://nvd.nist.gov/vuln/detail/CVE-2024-57791)

CVEs


Live chat
Online