First published: Fri May 31 2024(Updated: )
A vulnerability was found in libndp. A buffer overflow in NetworkManager that can be triggered by sending a malformed IPv6 router advertisement packet via malicious user locally. This happens as libndp was not validating correctly the route length information and hence leading to a flaw. This affects versions of libndp >= 1.0.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libndp | 1.6-1+deb11u1 1.8-1+deb12u1 1.9-1 | |
SUSE Libndp | >=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5564 has been classified as a high severity vulnerability due to the potential for a buffer overflow that can be exploited locally.
To fix CVE-2024-5564, update to the latest version of libndp that addresses the buffer overflow vulnerability.
CVE-2024-5564 affects libndp version 1.0 and later versions before the patch is applied.
CVE-2024-5564 can be exploited through locally sending a malformed IPv6 router advertisement packet.
While there are no public exploits reported for CVE-2024-5564, the vulnerability is critical to address due to the potential impacts.