CVE Vulnerabilities

CVE-2024-53580

NULL Pointer Dereference

Published: Dec 18, 2024 | Modified: Dec 31, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Red Hat Enterprise Linux 7 Extended Lifecycle Support RedHat iperf3-0:3.1.7-3.el7_9.1 *
Red Hat Enterprise Linux 8 RedHat iperf3-0:3.5-11.el8_10 *
Red Hat Enterprise Linux 8.2 Advanced Update Support RedHat iperf3-0:3.5-4.el8_2.1 *
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support RedHat iperf3-0:3.5-7.el8_4.1 *
Red Hat Enterprise Linux 8.4 Telecommunications Update Service RedHat iperf3-0:3.5-7.el8_4.1 *
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions RedHat iperf3-0:3.5-7.el8_4.1 *
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support RedHat iperf3-0:3.5-7.el8_6.1 *
Red Hat Enterprise Linux 8.6 Telecommunications Update Service RedHat iperf3-0:3.5-7.el8_6.1 *
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions RedHat iperf3-0:3.5-7.el8_6.1 *
Red Hat Enterprise Linux 8.8 Extended Update Support RedHat iperf3-0:3.5-7.el8_8.1 *
Red Hat Enterprise Linux 9 RedHat iperf3-0:3.9-13.el9_5.1 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat iperf3-0:3.9-10.el9_0.1 *
Red Hat Enterprise Linux 9.2 Extended Update Support RedHat iperf3-0:3.9-10.el9_2.1 *
Red Hat Enterprise Linux 9.4 Extended Update Support RedHat iperf3-0:3.9-11.el9_4.1 *

Potential Mitigations

References