CVE-2024-50299

In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb() A size validation fix similar to that in Commit 50619dbf8db7 ("sctp: add size validation when walking chunks") is also required in sctp_sf_ootb() to address a crash reported by syzbot: BUG: KMSAN: uninit-value in sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712 sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712 sctp_do_sm+0x181/0x93d0 net/sctp/sm_sideeffect.c:1166 sctp_endpoint_bh_rcv+0xc38/0xf90 net/sctp/endpointola.c:407 sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88 sctp_rcv+0x3831/0x3b20 net/sctp/input.c:243 sctp4_rcv+0x42/0x50 net/sctp/protocol.c:1159 ip_protocol_deliver_rcu+0xb51/0x13d0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x336/0x500 net/ipv4/ip_input.c:233
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*

History

21 Nov 2024, 21:11

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0ead60804b64f5bd6999eec88e503c6a1a242d41 - () https://git.kernel.org/stable/c/0ead60804b64f5bd6999eec88e503c6a1a242d41 - Patch
References () https://git.kernel.org/stable/c/40b283ba76665437bc2ac72079c51b57b25bff9e - () https://git.kernel.org/stable/c/40b283ba76665437bc2ac72079c51b57b25bff9e - Patch
References () https://git.kernel.org/stable/c/67b9a278b80f71ec62091ded97c6bcbea33b5ec3 - () https://git.kernel.org/stable/c/67b9a278b80f71ec62091ded97c6bcbea33b5ec3 - Patch
References () https://git.kernel.org/stable/c/8820d2d6589f62ee5514793fff9b50c9f8101182 - () https://git.kernel.org/stable/c/8820d2d6589f62ee5514793fff9b50c9f8101182 - Patch
References () https://git.kernel.org/stable/c/9b5d42aeaf1a52f73b003a33da6deef7df34685f - () https://git.kernel.org/stable/c/9b5d42aeaf1a52f73b003a33da6deef7df34685f - Patch
References () https://git.kernel.org/stable/c/a758aa6a773bb872196bcc3173171ef8996bddf0 - () https://git.kernel.org/stable/c/a758aa6a773bb872196bcc3173171ef8996bddf0 - Patch
References () https://git.kernel.org/stable/c/bf9bff13225baf5f658577f7d985fc4933d79527 - () https://git.kernel.org/stable/c/bf9bff13225baf5f658577f7d985fc4933d79527 - Patch
References () https://git.kernel.org/stable/c/d3fb3cc83cf313e4f87063ce0f3fea76b071567b - () https://git.kernel.org/stable/c/d3fb3cc83cf313e4f87063ce0f3fea76b071567b - Patch
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-908

19 Nov 2024, 21:57

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sctp: validar correctamente el tamaño de los fragmentos en sctp_sf_ootb() También se requiere una corrección de validación de tamaño similar a la del Commit 50619dbf8db7 ("sctp: agregar validación de tamaño al recorrer fragmentos") en sctp_sf_ootb() para abordar un fallo informado por syzbot: ERROR: KMSAN: valor no inicializado en sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712 sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712 sctp_do_sm+0x181/0x93d0 net/sctp/sm_sideeffect.c:1166 sctp_endpoint_bh_rcv+0xc38/0xf90 red/sctp/endpointola.c:407 sctp_inq_push+0x2ef/0x380 red/sctp/inqueue.c:88 sctp_rcv+0x3831/0x3b20 red/sctp/input.c:243 sctp4_rcv+0x42/0x50 red/sctp/protocol.c:1159 ip_protocol_deliver_rcu+0xb51/0x13d0 red/ipv4/ip_input.c:205 ip_local_deliver_finish+0x336/0x500 red/ipv4/ip_input.c:233

19 Nov 2024, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-19 02:16

Updated : 2024-11-21 21:11


NVD link : CVE-2024-50299

Mitre link : CVE-2024-50299

CVE.ORG link : CVE-2024-50299


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource