Linux Kernel Vulnerability in Receive Handling of CLC Messages by Vendor
CVE-2024-57791
Summary
A vulnerability has been identified in the Linux kernel related to the handling of CLC messages during network operations. Specifically, the length of the message received from the network may not be fully trusted, potentially leading to a scenario where the expected length exceeds the buffer size. This situation can cause the process to enter a deadloop while attempting to drain the excess data. The recent patch adds checks to the return value of sock_recvmsg, improving the robustness of the data draining process and mitigating the risk of deadloops.
Affected Version(s)
Linux fb4f79264c0fc6fd5a68ffe3e31bfff97311e1f1 < 82c7ad9ca09975aae737abffd66d1ad98874c13d
Linux fb4f79264c0fc6fd5a68ffe3e31bfff97311e1f1 < 6b80924af6216277892d5f091f5bfc7d1265fa28
Linux fb4f79264c0fc6fd5a68ffe3e31bfff97311e1f1
References
Timeline
Vulnerability published
Vulnerability Reserved