-

CVE-2024-36017

In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation

Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a
struct ifla_vf_vlan_info so the size of such attribute needs to be at least
of sizeof(struct ifla_vf_vlan_info) which is 14 bytes.
The current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes)
which is less than sizeof(struct ifla_vf_vlan_info) so this validation
is not enough and a too small attribute might be cast to a
struct ifla_vf_vlan_info, this might result in an out of bands
read access when accessing the saved (casted) entry in ivvl.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 8ac69ff2d0d5be9734c4402de932aa3dc8549c1a
Version 79aab093a0b5370d7fc4e99df75996f4744dc03f
Status affected
Version < 5e7ef2d88666a0212db8c38e6703864b9ce70169
Version 79aab093a0b5370d7fc4e99df75996f4744dc03f
Status affected
Version < 6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de
Version 79aab093a0b5370d7fc4e99df75996f4744dc03f
Status affected
Version < f3c1bf3054f96ddeab0621d920445bada769b40e
Version 79aab093a0b5370d7fc4e99df75996f4744dc03f
Status affected
Version < 6e4c7193954f4faab92f6e8d88bc5565317b44e7
Version 79aab093a0b5370d7fc4e99df75996f4744dc03f
Status affected
Version < 206003c748b88890a910ef7142d18f77be57550b
Version 79aab093a0b5370d7fc4e99df75996f4744dc03f
Status affected
Version < 4a4b9757789a1551d2df130df23bfb3545bfa7e8
Version 79aab093a0b5370d7fc4e99df75996f4744dc03f
Status affected
Version < 1aec77b2bb2ed1db0f5efc61c4c1ca3813307489
Version 79aab093a0b5370d7fc4e99df75996f4744dc03f
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.9
Status affected
Version < 4.9
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.314
Status unaffected
Version <= 5.4.*
Version 5.4.276
Status unaffected
Version <= 5.10.*
Version 5.10.217
Status unaffected
Version <= 5.15.*
Version 5.15.159
Status unaffected
Version <= 6.1.*
Version 6.1.91
Status unaffected
Version <= 6.6.*
Version 6.6.31
Status unaffected
Version <= 6.8.*
Version 6.8.10
Status unaffected
Version <= *
Version 6.9
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.17% 0.389
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string