First published: Wed Jun 12 2024(Updated: )
It was discovered that libndp incorrectly handled certain malformed IPv6 router advertisement packets. A local attacker could use this issue to cause NetworkManager to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libndp0 | <1.8-1fakesync1ubuntu0.24.04.1 | 1.8-1fakesync1ubuntu0.24.04.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/libndp0 | <1.8-1fakesync1ubuntu0.23.10.1 | 1.8-1fakesync1ubuntu0.23.10.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/libndp0 | <1.8-0ubuntu3.1 | 1.8-0ubuntu3.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libndp0 | <1.7-0ubuntu1.1 | 1.7-0ubuntu1.1 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6830-1 is classified as a denial of service vulnerability that may potentially allow arbitrary code execution.
To fix USN-6830-1, upgrade the libndp0 package to the appropriate patched version for your Ubuntu release.
Ubuntu versions 20.04, 22.04, 23.10, and 24.04 are affected by USN-6830-1.
USN-6830-1 exposes systems to potential crashes of NetworkManager and the possibility of remote code execution.
It is not safe to use your system if it is running a vulnerable version mentioned in USN-6830-1, and immediate remediation is highly recommended.