{"id":"CVE-2024-49571","summary":"net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg\n\nWhen receiving proposal msg in server, the field iparea_offset\nand the field ipv6_prefixes_cnt in proposal msg are from the\nremote client and can not be fully trusted. Especially the\nfield iparea_offset, once exceed the max value, there has the\nchance to access wrong address, and crash may happen.\n\nThis patch checks iparea_offset and ipv6_prefixes_cnt before using them.","modified":"2026-04-16T04:39:28.451219585Z","published":"2025-01-11T12:35:36.957Z","related":["SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:1177-1","SUSE-SU-2025:1178-1","SUSE-SU-2025:1180-1","SUSE-SU-2025:1293-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","USN-7379-2","USN-7380-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49571.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/47ce46349672a7e0c361bfe39ed0b22e824ef4fb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/62056d1592e63d85e82357ee2ae6a6a294f440b0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/846bada23bfcdeb83621b045ed85dc06c7833ff0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/91a7c27c1444ed4677b83fd5308d2cf03f5f0851"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a29e220d3c8edbf0e1beb0f028878a4a85966556"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f10635268a0a49ee902a3b63b5dbb76f4fed498e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49571.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49571"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e7b7a64a8493d47433fd003efbe6543e3f676294"},{"fixed":"846bada23bfcdeb83621b045ed85dc06c7833ff0"},{"fixed":"f10635268a0a49ee902a3b63b5dbb76f4fed498e"},{"fixed":"62056d1592e63d85e82357ee2ae6a6a294f440b0"},{"fixed":"91a7c27c1444ed4677b83fd5308d2cf03f5f0851"},{"fixed":"47ce46349672a7e0c361bfe39ed0b22e824ef4fb"},{"fixed":"a29e220d3c8edbf0e1beb0f028878a4a85966556"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49571.json"}}],"schema_version":"1.7.5"}