SB20250117113 - Input validation error in Linux kernel smc
Published: January 17, 2025 Updated: May 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2024-49571)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the smc_clc_msg_prop_valid() function in net/smc/smc_clc.c, within the smc_listen_prfx_check() and smc_find_ism_v1_device_serv() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/47ce46349672a7e0c361bfe39ed0b22e824ef4fb
- https://git.kernel.org/stable/c/62056d1592e63d85e82357ee2ae6a6a294f440b0
- https://git.kernel.org/stable/c/846bada23bfcdeb83621b045ed85dc06c7833ff0
- https://git.kernel.org/stable/c/91a7c27c1444ed4677b83fd5308d2cf03f5f0851
- https://git.kernel.org/stable/c/a29e220d3c8edbf0e1beb0f028878a4a85966556
- https://git.kernel.org/stable/c/f10635268a0a49ee902a3b63b5dbb76f4fed498e
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.176