Vulnerability identifier: #VU89680
Vulnerability risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-125
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in drivers/net/ipvlan/ipvlan_core.c. A remote attacker on the local network can send specially crafted packets to the system, trigger an out-of-bounds read error and read contents of memory on the system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/e2b46cd5796f083e452fbc624f65b80328b0c1a4
https://git.kernel.org/stable/c/25efdbe5fe542c3063d1948cc4e98abcb57621ca
https://git.kernel.org/stable/c/bffcdade259c05ab3436b5fab711612093c275ef
https://git.kernel.org/stable/c/346e94aa4a99378592c46d6a34c72703a32bd5be
https://git.kernel.org/stable/c/ab4a733874ead120691e8038272d22f8444d3638
https://git.kernel.org/stable/c/8d06006c7eb75587d986da46c48ba9274f94e8e7
https://git.kernel.org/stable/c/b583e6b25bf9321c91154f6c78d2173ef12c4241
https://git.kernel.org/stable/c/81225b2ea161af48e093f58e8dfee6d705b16af4
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.