CVE-2024-38659

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/06/2024
Last modified:
04/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> enic: Validate length of nl attributes in enic_set_vf_port<br /> <br /> enic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE<br /> is of length PORT_PROFILE_MAX and that the nl attributes<br /> IFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX.<br /> These attributes are validated (in the function do_setlink in rtnetlink.c)<br /> using the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE<br /> as NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and<br /> IFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation<br /> using the policy is for the max size of the attributes and not on exact<br /> size so the length of these attributes might be less than the sizes that<br /> enic_set_vf_port expects. This might cause an out of bands<br /> read access in the memcpys of the data of these<br /> attributes in enic_set_vf_port.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.35 (including) 4.19.316 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.278 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.219 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.161 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.93 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.33 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.9.4 (excluding)
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*