Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-42284

Опубликовано: 17 авг. 2024
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: tipc: Return non-zero value from tipc_udp_addr2str() on error tipc_udp_addr2str() should return non-zero value if the UDP media address is invalid. Otherwise, a buffer overflow access can occur in tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP media address.

A flaw was found in Linux kernel tipc. tipc_udp_addr2str() does not return a nonzero value when UDP media address is invalid, which can result in a buffer overflow in tipc_media_addr_printf().

Отчет

This vulnerability exists in the kernel's TIPC networking code. This functionality is typically only used for low-latency interprocess communication between nodes in a cluster computer. Additionally, an attacker must be able to create a UDP connection with an invalid address. Since this vulnerability is only applicable to systems using TIPC and exploitation requires an attacker to already have significant privileges on the target system, Red Hat assesses this flaw as having Moderate impact. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-393: Return of Wrong Status Code vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform enforces hardening guidelines to apply the most restrictive settings necessary for operational needs, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect and respond to threats in real time, helping prevent or limit exploitation attempts. Robust input validation and error handling ensure all user inputs are thoroughly validated, supporting consistent and secure system responses.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2024:887005.11.2024
Red Hat Enterprise Linux 8kernelFixedRHSA-2024:885605.11.2024
Red Hat Enterprise Linux 8.8 Extended Update SupportkernelFixedRHSA-2024:810715.10.2024
Red Hat Enterprise Linux 9kernelFixedRHSA-2024:816216.10.2024
Red Hat Enterprise Linux 9kernelFixedRHSA-2024:816216.10.2024
Red Hat Enterprise Linux 9.2 Extended Update SupportkernelFixedRHSA-2024:815716.10.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-393
https://bugzilla.redhat.com/show_bug.cgi?id=2305429kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error

EPSS

Процентиль: 8%
0.00032
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tipc: Return non-zero value from tipc_udp_addr2str() on error tipc_udp_addr2str() should return non-zero value if the UDP media address is invalid. Otherwise, a buffer overflow access can occur in tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP media address.

CVSS3: 7.8
nvd
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tipc: Return non-zero value from tipc_udp_addr2str() on error tipc_udp_addr2str() should return non-zero value if the UDP media address is invalid. Otherwise, a buffer overflow access can occur in tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP media address.

CVSS3: 7.8
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 7.8
debian
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: t ...

CVSS3: 7.8
github
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tipc: Return non-zero value from tipc_udp_addr2str() on error tipc_udp_addr2str() should return non-zero value if the UDP media address is invalid. Otherwise, a buffer overflow access can occur in tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP media address.

EPSS

Процентиль: 8%
0.00032
Низкий

7.3 High

CVSS3

Уязвимость CVE-2024-42284