{"uuid": "4f94f935-c5b7-449b-9023-679b44a5cfe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49571", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1312", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49571\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg\n\nWhen receiving proposal msg in server, the field iparea_offset\nand the field ipv6_prefixes_cnt in proposal msg are from the\nremote client and can not be fully trusted. Especially the\nfield iparea_offset, once exceed the max value, there has the\nchance to access wrong address, and crash may happen.\n\nThis patch checks iparea_offset and ipv6_prefixes_cnt before using them.\n\ud83d\udccf Published: 2025-01-11T12:35:36.957Z\n\ud83d\udccf Modified: 2025-01-11T12:35:36.957Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/846bada23bfcdeb83621b045ed85dc06c7833ff0\n2. https://git.kernel.org/stable/c/f10635268a0a49ee902a3b63b5dbb76f4fed498e\n3. https://git.kernel.org/stable/c/62056d1592e63d85e82357ee2ae6a6a294f440b0\n4. https://git.kernel.org/stable/c/91a7c27c1444ed4677b83fd5308d2cf03f5f0851\n5. https://git.kernel.org/stable/c/47ce46349672a7e0c361bfe39ed0b22e824ef4fb\n6. https://git.kernel.org/stable/c/a29e220d3c8edbf0e1beb0f028878a4a85966556", "creation_timestamp": "2025-01-11T13:06:46.000000Z"}