CVE-2024-38659

Source
https://cve.org/CVERecord?id=CVE-2024-38659
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38659.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-38659
Downstream
Related
Published
2024-06-21T10:28:15.337Z
Modified
2026-03-20T12:37:11.659860Z
Summary
enic: Validate length of nl attributes in enic_set_vf_port
Details

In the Linux kernel, the following vulnerability has been resolved:

enic: Validate length of nl attributes in enicsetvf_port

enicsetvfport assumes that the nl attribute IFLAPORTPROFILE is of length PORTPROFILEMAX and that the nl attributes IFLAPORTINSTANCEUUID, IFLAPORTHOSTUUID are of length PORTUUIDMAX. These attributes are validated (in the function dosetlink in rtnetlink.c) using the nlapolicy iflaportpolicy. The policy defines IFLAPORTPROFILE as NLASTRING, IFLAPORTINSTANCEUUID as NLABINARY and IFLAPORTHOSTUUID as NLASTRING. That means that the length validation using the policy is for the max size of the attributes and not on exact size so the length of these attributes might be less than the sizes that enicsetvfport expects. This might cause an out of bands read access in the memcpys of the data of these attributes in enicsetvfport.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38659.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f8bd909183acffad68780b10c1cdf36161cfd5d1
Fixed
2b649d7e0cb42a660f0260ef25fd55fdc9c6c600
Fixed
ca63fb7af9d3e531aa25f7ae187bfc6c7166ec2d
Fixed
3c0d36972edbe56fcf98899622d9b90ac9965227
Fixed
25571a12fbc8a1283bd8380d461267956fd426f7
Fixed
7077c22f84f41974a711604a42fd0e0684232ee5
Fixed
f6638e955ca00c489894789492776842e102af9c
Fixed
aee1955a1509a921c05c70dad5d6fc8563dfcb31
Fixed
e8021b94b0412c37bcc79027c2e382086b6ce449

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38659.json"