{ "id": "CVE-2024-47408", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:22.220", "lastModified": "2025-01-11T13:15:22.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check smcd_v2_ext_offset when receiving proposal msg\n\nWhen receiving proposal msg in server, the field smcd_v2_ext_offset in\nproposal msg is from the remote client and can not be fully trusted.\nOnce the value of smcd_v2_ext_offset exceed the max value, there has\nthe chance to access wrong address, and crash may happen.\n\nThis patch checks the value of smcd_v2_ext_offset before using it." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/smc: comprobar smcd_v2_ext_offset al recibir un mensaje de propuesta Al recibir un mensaje de propuesta en el servidor, el campo smcd_v2_ext_offset en el mensaje de propuesta es del cliente remoto y no se puede confiar completamente en \u00e9l. Una vez que el valor de smcd_v2_ext_offset excede el valor m\u00e1ximo, existe la posibilidad de acceder a una direcci\u00f3n incorrecta y puede ocurrir un bloqueo. Este parche verifica el valor de smcd_v2_ext_offset antes de usarlo." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/48d5a8a304a643613dab376a278f29d3e22f7c34", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/935caf324b445fe73d7708fae6f7176fb243f357", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/a36364d8d4fabb105001f992fb8ff2d3546203d6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/e1cc8be2a785a8f1ce1f597f3e608602c5fccd46", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] }