In the Linux kernel, the following vulnerability has been resolved:
wireguard: allowedips: avoid unaligned 64-bit memory accesses
On the parisc platform, the kernel issues kernel warnings because
swap_endian() tries to load a 128-bit IPv6 address from an unaligned
memory location:
Kernel: unaligned access to 0x55f4688c in wg_allowedips_insert_v6+0x2c/0x80 [wireguard] (iir 0xf3010df)
Kernel: unaligned access to 0x55f46884 in wg_allowedips_insert_v6+0x38/0x80 [wireguard] (iir 0xf2010dc)
Avoid such unaligned memory accesses by instead using the
get_unaligned_be64() helper macro.
[Jason: replace src[8] in original patch with src+8]
References
Configurations
Configuration 1 (hide)
|
History
08 Aug 2024, 14:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
Summary |
|
|
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/217978a29c6ceca76d3c640bf94bdf50c268d801 - Patch | |
References | () https://git.kernel.org/stable/c/2fb34bf76431e831f9863cd59adc0bd1f67b0fbf - Patch | |
References | () https://git.kernel.org/stable/c/6638a203abad35fa636d59ac47bdbc4bc100fd74 - Patch | |
References | () https://git.kernel.org/stable/c/948f991c62a4018fb81d85804eeab3029c6209f8 - Patch | |
References | () https://git.kernel.org/stable/c/ae630de24efb123d7199a43256396d7758f4cb75 - Patch | |
References | () https://git.kernel.org/stable/c/b4764f0ad3d68de8a0b847c05f427afb86dd54e6 - Patch | |
CWE | CWE-770 |
07 Aug 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-07 16:15
Updated : 2024-08-08 14:52
NVD link : CVE-2024-42247
Mitre link : CVE-2024-42247
CVE.ORG link : CVE-2024-42247
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-770
Allocation of Resources Without Limits or Throttling