Lucene search

K
cveLinuxCVE-2024-42284
HistoryAug 17, 2024 - 9:15 a.m.

CVE-2024-42284

2024-08-1709:15:09
CWE-754
Linux
web.nvd.nist.gov
32
linux kernel
tipc vulnerability
buffer overflow

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

EPSS

0

Percentile

5.0%

In the Linux kernel, the following vulnerability has been resolved:

tipc: Return non-zero value from tipc_udp_addr2str() on error

tipc_udp_addr2str() should return non-zero value if the UDP media
address is invalid. Otherwise, a buffer overflow access can occur in
tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP
media address.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange4.14.19.320
OR
linuxlinux_kernelRange4.205.4.282
OR
linuxlinux_kernelRange5.55.10.224
OR
linuxlinux_kernelRange5.115.15.165
OR
linuxlinux_kernelRange5.166.1.103
OR
linuxlinux_kernelRange6.26.6.44
OR
linuxlinux_kernelRange6.76.10.3
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "net/tipc/udp_media.c"
    ],
    "versions": [
      {
        "version": "d0f91938bede",
        "lessThan": "7ec3335dd89c",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d0f91938bede",
        "lessThan": "253405541be2",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d0f91938bede",
        "lessThan": "aa38bf74899d",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d0f91938bede",
        "lessThan": "5eea12767545",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d0f91938bede",
        "lessThan": "728734352743",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d0f91938bede",
        "lessThan": "76ddf84a52f0",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d0f91938bede",
        "lessThan": "2abe350db1aa",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d0f91938bede",
        "lessThan": "fa96c6baef1b",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "net/tipc/udp_media.c"
    ],
    "versions": [
      {
        "version": "4.1",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "4.1",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.320",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.282",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.224",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.165",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.103",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.44",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10.3",
        "lessThanOrEqual": "6.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.11",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

EPSS

0

Percentile

5.0%