CVE-2024-53151
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
24/12/2024
Last modified:
07/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
svcrdma: Address an integer overflow<br />
<br />
Dan Carpenter reports:<br />
> Commit 78147ca8b4a9 ("svcrdma: Add a "parsed chunk list" data<br />
> structure") from Jun 22, 2020 (linux-next), leads to the following<br />
> Smatch static checker warning:<br />
><br />
> net/sunrpc/xprtrdma/svc_rdma_recvfrom.c:498 xdr_check_write_chunk()<br />
> warn: potential user controlled sizeof overflow &#39;segcount * 4 * 4&#39;<br />
><br />
> net/sunrpc/xprtrdma/svc_rdma_recvfrom.c<br />
> 488 static bool xdr_check_write_chunk(struct svc_rdma_recv_ctxt *rctxt)<br />
> 489 {<br />
> 490 u32 segcount;<br />
> 491 __be32 *p;<br />
> 492<br />
> 493 if (xdr_stream_decode_u32(&rctxt->rc_stream, &segcount))<br />
> ^^^^^^^^<br />
><br />
> 494 return false;<br />
> 495<br />
> 496 /* A bogus segcount causes this buffer overflow check to fail. */<br />
> 497 p = xdr_inline_decode(&rctxt->rc_stream,<br />
> --> 498 segcount * rpcrdma_segment_maxsz * sizeof(*p));<br />
><br />
><br />
> segcount is an untrusted u32. On 32bit systems anything >= SIZE_MAX / 16 will<br />
> have an integer overflow and some those values will be accepted by<br />
> xdr_inline_decode().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.174 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.120 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/21e1cf688fb0397788c8dd42e1e0b08d58ac5c7b
- https://git.kernel.org/stable/c/3c63d8946e578663b868cb9912dac616ea68bfd0
- https://git.kernel.org/stable/c/4cbc3ba6dc2f746497cade60bcbaa82ae3696689
- https://git.kernel.org/stable/c/838dd342962cef4c320632a5af48d3c31f2f9877
- https://git.kernel.org/stable/c/c1f8195bf68edd2cef0f18a4cead394075a54b5a
- https://git.kernel.org/stable/c/e5c440c227ecdc721f2da0dd88b6358afd1031a7