CVE-2024-42130 Affecting dlm-kmp-default package, versions <6.4.0-150600.23.22.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES156-DLMKMPDEFAULT-8078306
- published 24 Sep 2024
- disclosed 23 Sep 2024
Introduced: 23 Sep 2024
CVE-2024-42130 Open this link in a new tabHow to fix?
Upgrade SLES:15.6
dlm-kmp-default
to version 6.4.0-150600.23.22.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream dlm-kmp-default
package and not the dlm-kmp-default
package as distributed by SLES
.
See How to fix?
for SLES:15.6
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
nfc/nci: Add the inconsistency check between the input data length and count
write$nci(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="610501"], 0xf)
Syzbot constructed a write() call with a data length of 3 bytes but a count value of 15, which passed too little data to meet the basic requirements of the function nci_rf_intf_activated_ntf_packet().
Therefore, increasing the comparison between data length and count value to avoid problems caused by inconsistent data length and count.
References
- https://www.suse.com/security/cve/CVE-2024-42130.html
- https://bugzilla.suse.com/1228687
- https://git.kernel.org/stable/c/056478b4321b36ca33567089d39ac992f6c9c37a
- https://git.kernel.org/stable/c/068648aab72c9ba7b0597354ef4d81ffaac7b979
- https://git.kernel.org/stable/c/22a72c1c10f43ca645a98725e0faff34592f4d08
- https://git.kernel.org/stable/c/41f5e2840cd0629f049ce5ce2f8dd10a8299de42
- https://git.kernel.org/stable/c/f07bcd8bba803c9e6ad2048543185d6c56587a2f