CVE-2024-49571

Source
https://cve.org/CVERecord?id=CVE-2024-49571
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49571.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-49571
Downstream
Related
Published
2025-01-11T12:35:36.957Z
Modified
2026-03-12T02:17:16.311134Z
Summary
net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg
Details

In the Linux kernel, the following vulnerability has been resolved:

net/smc: check ipareaoffset and ipv6prefixes_cnt when receiving proposal msg

When receiving proposal msg in server, the field ipareaoffset and the field ipv6prefixescnt in proposal msg are from the remote client and can not be fully trusted. Especially the field ipareaoffset, once exceed the max value, there has the chance to access wrong address, and crash may happen.

This patch checks ipareaoffset and ipv6prefixes_cnt before using them.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49571.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e7b7a64a8493d47433fd003efbe6543e3f676294
Fixed
846bada23bfcdeb83621b045ed85dc06c7833ff0
Fixed
f10635268a0a49ee902a3b63b5dbb76f4fed498e
Fixed
62056d1592e63d85e82357ee2ae6a6a294f440b0
Fixed
91a7c27c1444ed4677b83fd5308d2cf03f5f0851
Fixed
47ce46349672a7e0c361bfe39ed0b22e824ef4fb
Fixed
a29e220d3c8edbf0e1beb0f028878a4a85966556

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49571.json"