{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-47408","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-01-11T12:34:02.588Z","datePublished":"2025-01-11T12:35:35.284Z","dateUpdated":"2025-11-03T20:39:33.276Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:36:30.974Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check smcd_v2_ext_offset when receiving proposal msg\n\nWhen receiving proposal msg in server, the field smcd_v2_ext_offset in\nproposal msg is from the remote client and can not be fully trusted.\nOnce the value of smcd_v2_ext_offset exceed the max value, there has\nthe chance to access wrong address, and crash may happen.\n\nThis patch checks the value of smcd_v2_ext_offset before using it."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/smc/af_smc.c","net/smc/smc_clc.h"],"versions":[{"version":"5c21c4ccafe85906db809de3af391fd434df8a27","lessThan":"a36364d8d4fabb105001f992fb8ff2d3546203d6","status":"affected","versionType":"git"},{"version":"5c21c4ccafe85906db809de3af391fd434df8a27","lessThan":"e1cc8be2a785a8f1ce1f597f3e608602c5fccd46","status":"affected","versionType":"git"},{"version":"5c21c4ccafe85906db809de3af391fd434df8a27","lessThan":"935caf324b445fe73d7708fae6f7176fb243f357","status":"affected","versionType":"git"},{"version":"5c21c4ccafe85906db809de3af391fd434df8a27","lessThan":"48d5a8a304a643613dab376a278f29d3e22f7c34","status":"affected","versionType":"git"},{"version":"5c21c4ccafe85906db809de3af391fd434df8a27","lessThan":"9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/smc/af_smc.c","net/smc/smc_clc.h"],"versions":[{"version":"5.10","status":"affected"},{"version":"0","lessThan":"5.10","status":"unaffected","versionType":"semver"},{"version":"5.15.176","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.122","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.68","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.7","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"5.15.176"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.1.122"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.6.68"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.12.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.13"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/a36364d8d4fabb105001f992fb8ff2d3546203d6"},{"url":"https://git.kernel.org/stable/c/e1cc8be2a785a8f1ce1f597f3e608602c5fccd46"},{"url":"https://git.kernel.org/stable/c/935caf324b445fe73d7708fae6f7176fb243f357"},{"url":"https://git.kernel.org/stable/c/48d5a8a304a643613dab376a278f29d3e22f7c34"},{"url":"https://git.kernel.org/stable/c/9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad"}],"title":"net/smc: check smcd_v2_ext_offset when receiving proposal msg","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:39:33.276Z"}}]}}