In the Linux kernel, the following vulnerability has been resolved:
net/smc: check ipareaoffset and ipv6prefixes_cnt when receiving proposal msg
When receiving proposal msg in server, the field ipareaoffset and the field ipv6prefixescnt in proposal msg are from the remote client and can not be fully trusted. Especially the field ipareaoffset, once exceed the max value, there has the chance to access wrong address, and crash may happen.
This patch checks ipareaoffset and ipv6prefixes_cnt before using them.