First published: Sat Jan 11 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/smc: check return value of sock_recvmsg when draining clc data When receiving clc msg, the field length in smc_clc_msg_hdr indicates the length of msg should be received from network and the value should not be fully trusted as it is from the network. Once the value of length exceeds the value of buflen in function smc_clc_wait_msg it may run into deadloop when trying to drain the remaining data exceeding buflen. This patch checks the return value of sock_recvmsg when draining data in case of deadloop in draining.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
debian/linux | <=5.10.223-1 | 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-57791 is classified based on its impact on the Linux kernel's handling of socket messages.
To fix CVE-2024-57791, you should update your Linux kernel to the latest version where this vulnerability has been patched.
CVE-2024-57791 affects the Linux kernel used in various Linux distributions.
CVE-2024-57791 is a vulnerability related to improper handling of socket message reception in the Linux kernel.
Currently, the recommended approach for CVE-2024-57791 is to apply the relevant updates rather than relying on a workaround.