CVE-2024-1305
Published: 8 July 2024
tap-windows6 driver version 9.26 and earlier does not properly check the size data of incomming write operations which an attacker can use to overflow memory buffers, resulting in a bug check and potentially arbitrary code execution in kernel space
Notes
Author | Note |
---|---|
mdeslaur |
Windows-specific driver |
Priority
Status
Package | Release | Status |
---|---|---|
openvpn
Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(Windows only)
|
focal |
Not vulnerable
(Windows only)
|
|
jammy |
Not vulnerable
(Windows only)
|
|
mantic |
Ignored
(end of life, was needs-triage)
|
|
noble |
Not vulnerable
(Windows only)
|
|
trusty |
Not vulnerable
(Windows only)
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(Windows only)
|