CVE-2024-5564

NameCVE-2024-5564
DescriptionA vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3837-1, DSA-5713-1, ELA-1113-1
Debian Bugs1072366

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libndp (PTS)jessie, jessie (lts)1.4-2+deb8u2fixed
stretch (lts), stretch1.6-1+deb9u1fixed
buster (security), buster, buster (lts)1.6-1+deb10u1fixed
bullseye (security), bullseye1.6-1+deb11u1fixed
bookworm (security), bookworm1.8-1+deb12u1fixed
sid, trixie1.9-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libndpsourcejessie1.4-2+deb8u2ELA-1113-1
libndpsourcestretch1.6-1+deb9u1ELA-1113-1
libndpsourcebuster1.6-1+deb10u1DLA-3837-1
libndpsourcebullseye1.6-1+deb11u1DSA-5713-1
libndpsourcebookworm1.8-1+deb12u1DSA-5713-1
libndpsource(unstable)1.8-21072366

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=2284122
https://github.com/jpirko/libndp/issues/26
Introduced with: https://github.com/jpirko/libndp/commit/8296a5bf075543eef2167afdfecb222e70866744 (v1.0)
Fixed by: https://github.com/jpirko/libndp/commit/05e4ba7b0d126eea4c04387dcf40596059ee24af

Search for package or bug name: Reporting problems