Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-42284 |
CWE-ID | CWE-119 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU96176
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42284
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the tipc_udp_addr2str() function in net/tipc/udp_media.c. A local user can escalate privileges on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.19 - 6.10.2
CPE2.3https://git.kernel.org/stable/c/728734352743a78b4c5a7285b282127696a4a813
https://git.kernel.org/stable/c/76ddf84a52f0d8ec3f5db6ccce08faf202a17d28
https://git.kernel.org/stable/c/2abe350db1aa599eeebc6892237d0bce0f1de62a
https://git.kernel.org/stable/c/fa96c6baef1b5385e2f0c0677b32b3839e716076
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.320
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.224
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.165
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.282
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.103
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.3
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.44
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.