A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.
Workaround:
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:4618 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4619 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4620 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4622 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4636 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4640 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4641 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4642 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4643 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-5564 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2284122 | issue tracking |
https://lists.debian.org/debian-lts-announce/2024/06/msg00011.html |