Lucene search

K
cveLinuxCVE-2024-42154
HistoryJul 30, 2024 - 8:15 a.m.

CVE-2024-42154

2024-07-3008:15:06
CWE-754
Linux
web.nvd.nist.gov
63
linux kernel
cve-2024-42154
tcp_metrics
source addr length
vulnerability

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

Low

EPSS

0.004

Percentile

73.2%

In the Linux kernel, the following vulnerability has been resolved:

tcp_metrics: validate source addr length

I don’t see anything checking that TCP_METRICS_ATTR_SADDR_IPV4
is at least 4 bytes long, and the policy doesn’t have an entry
for this attribute at all (neither does it for IPv6 but v6 is
manually validated).

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange3.144.19.318
OR
linuxlinux_kernelRange4.205.4.280
OR
linuxlinux_kernelRange5.55.10.222
OR
linuxlinux_kernelRange5.115.15.163
OR
linuxlinux_kernelRange5.166.1.98
OR
linuxlinux_kernelRange6.26.6.39
OR
linuxlinux_kernelRange6.76.9.9
OR
linuxlinux_kernelMatch6.10rc1
OR
linuxlinux_kernelMatch6.10rc2
OR
linuxlinux_kernelMatch6.10rc3
OR
linuxlinux_kernelMatch6.10rc4
OR
linuxlinux_kernelMatch6.10rc5
OR
linuxlinux_kernelMatch6.10rc6
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "net/ipv4/tcp_metrics.c"
    ],
    "versions": [
      {
        "version": "3e7013ddf55a",
        "lessThan": "19d997b59fa1",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "3e7013ddf55a",
        "lessThan": "2a2e79dbe223",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "3e7013ddf55a",
        "lessThan": "cdffc358717e",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "3e7013ddf55a",
        "lessThan": "ef7c428b425b",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "3e7013ddf55a",
        "lessThan": "31f03bb04146",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "3e7013ddf55a",
        "lessThan": "8c2debdd170e",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "3e7013ddf55a",
        "lessThan": "3d550dd54187",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "3e7013ddf55a",
        "lessThan": "66be40e622e1",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "net/ipv4/tcp_metrics.c"
    ],
    "versions": [
      {
        "version": "3.14",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "3.14",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.318",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.280",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.222",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.163",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.98",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.39",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9.9",
        "lessThanOrEqual": "6.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.6

Confidence

Low

EPSS

0.004

Percentile

73.2%