{"id":"CVE-2024-42247","summary":"wireguard: allowedips: avoid unaligned 64-bit memory accesses","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwireguard: allowedips: avoid unaligned 64-bit memory accesses\n\nOn the parisc platform, the kernel issues kernel warnings because\nswap_endian() tries to load a 128-bit IPv6 address from an unaligned\nmemory location:\n\n Kernel: unaligned access to 0x55f4688c in wg_allowedips_insert_v6+0x2c/0x80 [wireguard] (iir 0xf3010df)\n Kernel: unaligned access to 0x55f46884 in wg_allowedips_insert_v6+0x38/0x80 [wireguard] (iir 0xf2010dc)\n\nAvoid such unaligned memory accesses by instead using the\nget_unaligned_be64() helper macro.\n\n[Jason: replace src[8] in original patch with src+8]","modified":"2026-03-20T12:37:40.177667Z","published":"2024-08-07T15:14:32.232Z","related":["SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3483-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42247.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/217978a29c6ceca76d3c640bf94bdf50c268d801"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2fb34bf76431e831f9863cd59adc0bd1f67b0fbf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6638a203abad35fa636d59ac47bdbc4bc100fd74"},{"type":"WEB","url":"https://git.kernel.org/stable/c/948f991c62a4018fb81d85804eeab3029c6209f8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ae630de24efb123d7199a43256396d7758f4cb75"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b4764f0ad3d68de8a0b847c05f427afb86dd54e6"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42247.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42247"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e7096c131e5161fa3b8e52a650d7719d2857adfd"},{"fixed":"ae630de24efb123d7199a43256396d7758f4cb75"},{"fixed":"b4764f0ad3d68de8a0b847c05f427afb86dd54e6"},{"fixed":"217978a29c6ceca76d3c640bf94bdf50c268d801"},{"fixed":"6638a203abad35fa636d59ac47bdbc4bc100fd74"},{"fixed":"2fb34bf76431e831f9863cd59adc0bd1f67b0fbf"},{"fixed":"948f991c62a4018fb81d85804eeab3029c6209f8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42247.json"}}],"schema_version":"1.7.5"}