A vulnerability was found in libndp. A buffer overflow in NetworkManager that can be triggered by sending a malformed IPv6 router advertisement packet via malicious user locally. This happens as libndp was not validating correctly the route length information and hence leading to a flaw. This affects versions of libndp >= 1.0.
Created libndp tracking bugs for this issue: Affects: fedora-all [bug 2291319]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:4619 https://access.redhat.com/errata/RHSA-2024:4619
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2024:4618 https://access.redhat.com/errata/RHSA-2024:4618
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2024:4622 https://access.redhat.com/errata/RHSA-2024:4622
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:4620 https://access.redhat.com/errata/RHSA-2024:4620
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:4636 https://access.redhat.com/errata/RHSA-2024:4636
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:4640 https://access.redhat.com/errata/RHSA-2024:4640
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:4643 https://access.redhat.com/errata/RHSA-2024:4643
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:4641 https://access.redhat.com/errata/RHSA-2024:4641
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4642 https://access.redhat.com/errata/RHSA-2024:4642