CVE-2024-52949
Publication date 16 December 2024
Last updated 6 February 2025
Ubuntu priority
iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
Why is this CVE low priority?
Limited to a denial of service only because of compiler hardening
Status
Package | Ubuntu Release | Status |
---|---|---|
iptraf-ng | 24.10 oracular |
Vulnerable
|
24.04 LTS noble |
Vulnerable
|
|
22.04 LTS jammy |
Vulnerable
|
|
20.04 LTS focal |
Vulnerable
|
|
18.04 LTS bionic |
Vulnerable
|
|
16.04 LTS xenial |
Needs evaluation
|