We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-36017

rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation



Description

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a struct ifla_vf_vlan_info so the size of such attribute needs to be at least of sizeof(struct ifla_vf_vlan_info) which is 14 bytes. The current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes) which is less than sizeof(struct ifla_vf_vlan_info) so this validation is not enough and a too small attribute might be cast to a struct ifla_vf_vlan_info, this might result in an out of bands read access when accessing the saved (casted) entry in ivvl.

Reserved 2024-05-17 | Published 2024-05-30 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

79aab093a0b5370d7fc4e99df75996f4744dc03f before 8ac69ff2d0d5be9734c4402de932aa3dc8549c1a
affected

79aab093a0b5370d7fc4e99df75996f4744dc03f before 5e7ef2d88666a0212db8c38e6703864b9ce70169
affected

79aab093a0b5370d7fc4e99df75996f4744dc03f before 6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de
affected

79aab093a0b5370d7fc4e99df75996f4744dc03f before f3c1bf3054f96ddeab0621d920445bada769b40e
affected

79aab093a0b5370d7fc4e99df75996f4744dc03f before 6e4c7193954f4faab92f6e8d88bc5565317b44e7
affected

79aab093a0b5370d7fc4e99df75996f4744dc03f before 206003c748b88890a910ef7142d18f77be57550b
affected

79aab093a0b5370d7fc4e99df75996f4744dc03f before 4a4b9757789a1551d2df130df23bfb3545bfa7e8
affected

79aab093a0b5370d7fc4e99df75996f4744dc03f before 1aec77b2bb2ed1db0f5efc61c4c1ca3813307489
affected

Default status
affected

4.9
affected

Any version before 4.9
unaffected

4.19.314
unaffected

5.4.276
unaffected

5.10.217
unaffected

5.15.159
unaffected

6.1.91
unaffected

6.6.31
unaffected

6.8.10
unaffected

6.9
unaffected

References

git.kernel.org/...c/8ac69ff2d0d5be9734c4402de932aa3dc8549c1a

git.kernel.org/...c/5e7ef2d88666a0212db8c38e6703864b9ce70169

git.kernel.org/...c/6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de

git.kernel.org/...c/f3c1bf3054f96ddeab0621d920445bada769b40e

git.kernel.org/...c/6e4c7193954f4faab92f6e8d88bc5565317b44e7

git.kernel.org/...c/206003c748b88890a910ef7142d18f77be57550b

git.kernel.org/...c/4a4b9757789a1551d2df130df23bfb3545bfa7e8

git.kernel.org/...c/1aec77b2bb2ed1db0f5efc61c4c1ca3813307489

cve.org (CVE-2024-36017)

nvd.nist.gov (CVE-2024-36017)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-36017

Support options

Helpdesk Chat, Email, Knowledgebase