CVE-2024-50299

medium

Description

In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb() A size validation fix similar to that in Commit 50619dbf8db7 ("sctp: add size validation when walking chunks") is also required in sctp_sf_ootb() to address a crash reported by syzbot: BUG: KMSAN: uninit-value in sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712 sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712 sctp_do_sm+0x181/0x93d0 net/sctp/sm_sideeffect.c:1166 sctp_endpoint_bh_rcv+0xc38/0xf90 net/sctp/endpointola.c:407 sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88 sctp_rcv+0x3831/0x3b20 net/sctp/input.c:243 sctp4_rcv+0x42/0x50 net/sctp/protocol.c:1159 ip_protocol_deliver_rcu+0xb51/0x13d0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x336/0x500 net/ipv4/ip_input.c:233

References

https://git.kernel.org/stable/c/d3fb3cc83cf313e4f87063ce0f3fea76b071567b

https://git.kernel.org/stable/c/bf9bff13225baf5f658577f7d985fc4933d79527

https://git.kernel.org/stable/c/a758aa6a773bb872196bcc3173171ef8996bddf0

https://git.kernel.org/stable/c/9b5d42aeaf1a52f73b003a33da6deef7df34685f

https://git.kernel.org/stable/c/8820d2d6589f62ee5514793fff9b50c9f8101182

https://git.kernel.org/stable/c/67b9a278b80f71ec62091ded97c6bcbea33b5ec3

https://git.kernel.org/stable/c/40b283ba76665437bc2ac72079c51b57b25bff9e

https://git.kernel.org/stable/c/0ead60804b64f5bd6999eec88e503c6a1a242d41

Details

Source: Mitre, NVD

Published: 2024-11-19

Updated: 2024-11-19

Risk Information

CVSS v2

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Severity: High

CVSS v3

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium