CVE-2024-5564

HIGH

libndp - Buffer Overflow

Title source: llm
STIX 2.1

Description

A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.

References (13)

Core 13
Core References
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHBA-2025:6631
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:4618
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:4619
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:4620
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:4622
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:4636
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:4640
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:4641
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:4642
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:4643
Vendor Advisory vdb-entry x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2024-5564
Issue Tracking issue-tracking x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2284122

Scores

CVSS v3 8.1
EPSS 0.0106
EPSS Percentile 77.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-120
Status published
Products (14)
Red Hat/Red Hat Enterprise Linux 10 0:1.9-2.el10
Red Hat/Red Hat Enterprise Linux 7 Extended Lifecycle Support 0:1.2-10.el7_9
Red Hat/Red Hat Enterprise Linux 8 0:1.7-7.el8_10
Red Hat/Red Hat Enterprise Linux 8.2 Advanced Update Support 0:1.7-4.el8_2
Red Hat/Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 0:1.7-6.el8_4
Red Hat/Red Hat Enterprise Linux 8.4 Telecommunications Update Service 0:1.7-6.el8_4
Red Hat/Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions 0:1.7-6.el8_4
Red Hat/Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 0:1.7-7.el8_6
Red Hat/Red Hat Enterprise Linux 8.6 Telecommunications Update Service 0:1.7-7.el8_6
Red Hat/Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions 0:1.7-7.el8_6
... and 4 more
Published May 31, 2024
Tracked Since Feb 18, 2026