{"id":"CVE-2024-47408","summary":"net/smc: check smcd_v2_ext_offset when receiving proposal msg","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check smcd_v2_ext_offset when receiving proposal msg\n\nWhen receiving proposal msg in server, the field smcd_v2_ext_offset in\nproposal msg is from the remote client and can not be fully trusted.\nOnce the value of smcd_v2_ext_offset exceed the max value, there has\nthe chance to access wrong address, and crash may happen.\n\nThis patch checks the value of smcd_v2_ext_offset before using it.","modified":"2026-04-16T04:37:22.183419639Z","published":"2025-01-11T12:35:35.284Z","related":["SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:1177-1","SUSE-SU-2025:1178-1","SUSE-SU-2025:1180-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","USN-7379-2","USN-7380-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47408.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/48d5a8a304a643613dab376a278f29d3e22f7c34"},{"type":"WEB","url":"https://git.kernel.org/stable/c/935caf324b445fe73d7708fae6f7176fb243f357"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a36364d8d4fabb105001f992fb8ff2d3546203d6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e1cc8be2a785a8f1ce1f597f3e608602c5fccd46"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47408.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47408"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"5c21c4ccafe85906db809de3af391fd434df8a27"},{"fixed":"a36364d8d4fabb105001f992fb8ff2d3546203d6"},{"fixed":"e1cc8be2a785a8f1ce1f597f3e608602c5fccd46"},{"fixed":"935caf324b445fe73d7708fae6f7176fb243f357"},{"fixed":"48d5a8a304a643613dab376a278f29d3e22f7c34"},{"fixed":"9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47408.json"}}],"schema_version":"1.7.5"}