CVE-2024-42154

In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don't see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn't have an entry for this attribute at all (neither does it for IPv6 but v6 is manually validated).
References
Link Resource
https://git.kernel.org/stable/c/19d997b59fa1fd7a02e770ee0881c0652b9c32c9 Mailing List Patch
https://git.kernel.org/stable/c/2a2e79dbe2236a1289412d2044994f7ab419b44c Mailing List Patch
https://git.kernel.org/stable/c/31f03bb04146c1c6df6c03e9f45401f5f5a985d3 Mailing List Patch
https://git.kernel.org/stable/c/3d550dd5418729a6e77fe7721d27adea7152e321 Mailing List Patch
https://git.kernel.org/stable/c/66be40e622e177316ae81717aa30057ba9e61dff Mailing List Patch
https://git.kernel.org/stable/c/8c2debdd170e395934ac0e039748576dfde14e99 Mailing List Patch
https://git.kernel.org/stable/c/cdffc358717e436bb67122bb82c1a2a26e050f98 Mailing List Patch
https://git.kernel.org/stable/c/ef7c428b425beeb52b894e16f1c4b629d6cebfb6 Mailing List Patch
http://www.openwall.com/lists/oss-security/2024/09/24/3
http://www.openwall.com/lists/oss-security/2024/09/24/4
http://www.openwall.com/lists/oss-security/2024/09/25/3
https://git.kernel.org/stable/c/19d997b59fa1fd7a02e770ee0881c0652b9c32c9 Mailing List Patch
https://git.kernel.org/stable/c/2a2e79dbe2236a1289412d2044994f7ab419b44c Mailing List Patch
https://git.kernel.org/stable/c/31f03bb04146c1c6df6c03e9f45401f5f5a985d3 Mailing List Patch
https://git.kernel.org/stable/c/3d550dd5418729a6e77fe7721d27adea7152e321 Mailing List Patch
https://git.kernel.org/stable/c/66be40e622e177316ae81717aa30057ba9e61dff Mailing List Patch
https://git.kernel.org/stable/c/8c2debdd170e395934ac0e039748576dfde14e99 Mailing List Patch
https://git.kernel.org/stable/c/cdffc358717e436bb67122bb82c1a2a26e050f98 Mailing List Patch
https://git.kernel.org/stable/c/ef7c428b425beeb52b894e16f1c4b629d6cebfb6 Mailing List Patch
https://security.netapp.com/advisory/ntap-20240828-0010/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*

History

No history.

Information

Published : 2024-07-30 08:15

Updated : 2024-11-21 09:33


NVD link : CVE-2024-42154

Mitre link : CVE-2024-42154

CVE.ORG link : CVE-2024-42154


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions