CVE-2024-57973
IBM CXGB4 Linux Kernel Integer Overflow Vulnerability
Description
In the Linux kernel, the following vulnerability has been resolved: rdma/cxgb4: Prevent potential integer overflow on 32bit The "gl->tot_len" variable is controlled by the user. It comes from process_responses(). On 32bit systems, the "gl->tot_len + sizeof(struct cpl_pass_accept_req) + sizeof(struct rss_header)" addition could have an integer wrapping bug. Use size_add() to prevent this.
INFO
Published Date :
Feb. 27, 2025, 2:15 a.m.
Last Modified :
March 13, 2025, 1:15 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Use size_add for additions involving user-controlled lengths.
- Review addition operations for potential integer overflows.
- Test the fix on 32bit systems thoroughly.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-57973
.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-57973
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-57973
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-57973
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-57973
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mar. 13, 2025
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/2b759f78b83221f4a1cae3aeb20b500e375f3ee6 Added Reference https://git.kernel.org/stable/c/d64148a10a85952352de6091ceed99fb9ce2d3ee Added Reference https://git.kernel.org/stable/c/e53ca458f543aa352d09b484550de173cb9085c2 -
Initial Analysis by [email protected]
Mar. 07, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE CWE-190 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.13 from (excluding) 6.13.2 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 from (excluding) 6.6.76 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 from (excluding) 6.12.13 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.8 from (excluding) 6.1.129 Added Reference Type kernel.org: https://git.kernel.org/stable/c/4422f452d028850b9cc4fd8f1cf45a8ff91855eb Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/aeb814484387811b3579d5c78ad4eb301e3bf1c8 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/bd96a3935e89486304461a21752f824fc25e0f0b Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/dd352107f22bfbecbbf3b74bde14f3f932296309 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/de8d88b68d0cfd41152a7a63d6aec0ed3e1b837a Types: Patch -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Feb. 27, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: rdma/cxgb4: Prevent potential integer overflow on 32bit The "gl->tot_len" variable is controlled by the user. It comes from process_responses(). On 32bit systems, the "gl->tot_len + sizeof(struct cpl_pass_accept_req) + sizeof(struct rss_header)" addition could have an integer wrapping bug. Use size_add() to prevent this. Added Reference https://git.kernel.org/stable/c/4422f452d028850b9cc4fd8f1cf45a8ff91855eb Added Reference https://git.kernel.org/stable/c/aeb814484387811b3579d5c78ad4eb301e3bf1c8 Added Reference https://git.kernel.org/stable/c/bd96a3935e89486304461a21752f824fc25e0f0b Added Reference https://git.kernel.org/stable/c/dd352107f22bfbecbbf3b74bde14f3f932296309 Added Reference https://git.kernel.org/stable/c/de8d88b68d0cfd41152a7a63d6aec0ed3e1b837a