Improper Handling of Length Parameter Inconsistency Affecting perf package, versions <0:4.18.0-553.22.1.el8_10
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-PERF-7602548
- published 5 Aug 2024
- disclosed 30 Jul 2024
Introduced: 30 Jul 2024
CVE-2024-42154 Open this link in a new tabHow to fix?
Upgrade RHEL:8
perf
to version 0:4.18.0-553.22.1.el8_10 or higher.
This issue was patched in RHSA-2024:7000
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream perf
package and not the perf
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
tcp_metrics: validate source addr length
I don't see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn't have an entry for this attribute at all (neither does it for IPv6 but v6 is manually validated).
References
- https://access.redhat.com/security/cve/CVE-2024-42154
- http://www.openwall.com/lists/oss-security/2024/09/24/3
- http://www.openwall.com/lists/oss-security/2024/09/24/4
- http://www.openwall.com/lists/oss-security/2024/09/25/3
- https://git.kernel.org/stable/c/19d997b59fa1fd7a02e770ee0881c0652b9c32c9
- https://git.kernel.org/stable/c/2a2e79dbe2236a1289412d2044994f7ab419b44c
- https://git.kernel.org/stable/c/31f03bb04146c1c6df6c03e9f45401f5f5a985d3
- https://git.kernel.org/stable/c/3d550dd5418729a6e77fe7721d27adea7152e321
- https://git.kernel.org/stable/c/66be40e622e177316ae81717aa30057ba9e61dff
- https://git.kernel.org/stable/c/8c2debdd170e395934ac0e039748576dfde14e99
- https://git.kernel.org/stable/c/cdffc358717e436bb67122bb82c1a2a26e050f98
- https://git.kernel.org/stable/c/ef7c428b425beeb52b894e16f1c4b629d6cebfb6
- https://security.netapp.com/advisory/ntap-20240828-0010/