First published: Fri May 31 2024(Updated: )
A vulnerability was found in libndp. A buffer overflow in NetworkManager that can be triggered by sending a malformed IPv6 router advertisement packet via malicious user locally. This happens as libndp was not validating correctly the route length information and hence leading to a flaw. This affects versions of libndp >= 1.0.
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Libndp | >=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2284122 is considered high due to the potential for local exploitation through a buffer overflow vulnerability.
To fix REDHAT-BUG-2284122, you should update the libndp package to the latest version that addresses this vulnerability.
REDHAT-BUG-2284122 is caused by a buffer overflow in NetworkManager due to improper validation of route length information within libndp.
Users running affected versions of libndp, particularly version 1.0 and earlier, are impacted by REDHAT-BUG-2284122.
No, REDHAT-BUG-2284122 requires local exploitation, as it is triggered by sending a malformed IPv6 router advertisement packet locally.