-
CVE-2024-36017
- EPSS 0.17%
- Published 30.05.2024 13:15:49
- Last modified 21.11.2024 09:21:26
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a struct ifla_vf_vlan_info so the size of such attribute needs to be at least of sizeof(struct ifla_vf_vlan_info) which is 14 bytes. The current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes) which is less than sizeof(struct ifla_vf_vlan_info) so this validation is not enough and a too small attribute might be cast to a struct ifla_vf_vlan_info, this might result in an out of bands read access when accessing the saved (casted) entry in ivvl.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
8ac69ff2d0d5be9734c4402de932aa3dc8549c1a
Version
79aab093a0b5370d7fc4e99df75996f4744dc03f
Status
affected
Version <
5e7ef2d88666a0212db8c38e6703864b9ce70169
Version
79aab093a0b5370d7fc4e99df75996f4744dc03f
Status
affected
Version <
6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de
Version
79aab093a0b5370d7fc4e99df75996f4744dc03f
Status
affected
Version <
f3c1bf3054f96ddeab0621d920445bada769b40e
Version
79aab093a0b5370d7fc4e99df75996f4744dc03f
Status
affected
Version <
6e4c7193954f4faab92f6e8d88bc5565317b44e7
Version
79aab093a0b5370d7fc4e99df75996f4744dc03f
Status
affected
Version <
206003c748b88890a910ef7142d18f77be57550b
Version
79aab093a0b5370d7fc4e99df75996f4744dc03f
Status
affected
Version <
4a4b9757789a1551d2df130df23bfb3545bfa7e8
Version
79aab093a0b5370d7fc4e99df75996f4744dc03f
Status
affected
Version <
1aec77b2bb2ed1db0f5efc61c4c1ca3813307489
Version
79aab093a0b5370d7fc4e99df75996f4744dc03f
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
4.9
Status
affected
Version <
4.9
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.314
Status
unaffected
Version <=
5.4.*
Version
5.4.276
Status
unaffected
Version <=
5.10.*
Version
5.10.217
Status
unaffected
Version <=
5.15.*
Version
5.15.159
Status
unaffected
Version <=
6.1.*
Version
6.1.91
Status
unaffected
Version <=
6.6.*
Version
6.6.31
Status
unaffected
Version <=
6.8.*
Version
6.8.10
Status
unaffected
Version <=
*
Version
6.9
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.17% | 0.389 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|