CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
73.2%
In the Linux kernel, the following vulnerability has been resolved:
tcp_metrics: validate source addr length
I don’t see anything checking that TCP_METRICS_ATTR_SADDR_IPV4
is at least 4 bytes long, and the policy doesn’t have an entry
for this attribute at all (neither does it for IPv6 but v6 is
manually validated).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/66be40e622e177316ae81717aa30057ba9e61dff (6.10-rc7)
git.kernel.org/stable/c/19d997b59fa1fd7a02e770ee0881c0652b9c32c9
git.kernel.org/stable/c/2a2e79dbe2236a1289412d2044994f7ab419b44c
git.kernel.org/stable/c/31f03bb04146c1c6df6c03e9f45401f5f5a985d3
git.kernel.org/stable/c/3d550dd5418729a6e77fe7721d27adea7152e321
git.kernel.org/stable/c/66be40e622e177316ae81717aa30057ba9e61dff
git.kernel.org/stable/c/8c2debdd170e395934ac0e039748576dfde14e99
git.kernel.org/stable/c/cdffc358717e436bb67122bb82c1a2a26e050f98
git.kernel.org/stable/c/ef7c428b425beeb52b894e16f1c4b629d6cebfb6
launchpad.net/bugs/cve/CVE-2024-42154
nvd.nist.gov/vuln/detail/CVE-2024-42154
security-tracker.debian.org/tracker/CVE-2024-42154
www.cve.org/CVERecord?id=CVE-2024-42154