
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Linux kernel's SMC (Shared Memory Communication) protocol implementation. The issue, tracked as CVE-2024-50034, involves a NULL pointer dereference that occurs when INET_PROTOSW_ICSK is set but icsk->icsk_sync_mss is not properly initialized. The vulnerability affects Linux kernel versions up to 6.11.4 and release candidates 6.12-rc1 and 6.12-rc2 (NVD).
The vulnerability manifests as a NULL pointer dereference at virtual address 0x0 when handling SMC protocol operations. The issue occurs because when INET_PROTOSW_ICSK is set, icsk->icsk_sync_mss must be set as well, but this requirement was not properly implemented. The bug triggers a kernel panic with error code ESR = 0x0000000086000005, indicating an instruction abort at the current Exception Level with a level 1 translation fault (Kernel Patch).
When exploited, this vulnerability results in a kernel panic, causing a denial of service condition. The issue affects systems using the SMC protocol implementation and can be triggered through normal socket operations (NVD).
A fix has been implemented that adds a toy implementation of smc_sync_mss function which returns 0, preventing the NULL pointer dereference. The fix provides a temporary solution while laying groundwork for proper MSS synchronization support in IPPROTO_SMC. Users should update to patched kernel versions that include this fix (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."