CVE-2024-27414

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27414
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27414.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27414
Downstream
Related
Published
2024-05-17T11:50:57.207Z
Modified
2025-11-28T02:34:58.429899Z
Summary
rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back
Details

In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: fix error logic of IFLABRIDGEFLAGS writing back

In the commit d73ef2d69c0d ("rtnetlink: let rtnlbridgesetlink checks IFLABRIDGEMODE length"), an adjustment was made to the old loop logic in the function rtnl_bridge_setlink to enable the loop to also check the length of the IFLABRIDGEMODE attribute. However, this adjustment removed the break statement and led to an error logic of the flags writing back at the end of this function.

if (haveflags) memcpy(nladata(attr), &flags, sizeof(flags)); // attr should point to IFLABRIDGEFLAGS NLA !!!

Before the mentioned commit, the attr is granted to be IFLABRIDGEFLAGS. However, this is not necessarily true fow now as the updated loop will let the attr point to the last NLA, even an invalid NLA which could cause overflow writes.

This patch introduces a new variable br_flag to save the NLA pointer that points to IFLABRIDGEFLAGS and uses it to resolve the mentioned error logic.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27414.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ad46d4861ed36315d3d9e838723ba3e367ecc042
Fixed
b9fbc44159dfc3e9a7073032752d9e03f5194a6f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
abb0172fa8dc4a4ec51aa992b7269ed65959f310
Fixed
882a51a10ecf24ce135d573afa0872aef02c5125
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
047508edd602921ee8bb0f2aa2100aa2e9bedc75
Fixed
a1227b27fcccc99dc44f912b479e01a17e2d7d31
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8dfac8071d58447e5cace4c4c6fe493ce2f615f6
Fixed
f2261eb994aa5757c1da046b78e3229a3ece0ad9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d73ef2d69c0dba5f5a1cb9600045c873bab1fb7f
Fixed
167d8642daa6a44b51de17f8ff0f584e1e762db7
Fixed
831bc2728fb48a8957a824cba8c264b30dca1425
Fixed
743ad091fb46e622f1b690385bb15e3cd3daf874
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
00757f58e37b2d9a6f99e15be484712390cd2bab

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.271
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.212
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.151
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.81
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.21
Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.7.9