CVE-2024-46679

Source
https://cve.org/CVERecord?id=CVE-2024-46679
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46679.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-46679
Downstream
Related
Published
2024-09-13T05:29:13.450Z
Modified
2026-05-18T05:56:08.832443231Z
Summary
ethtool: check device is present when getting link settings
Details

In the Linux kernel, the following vulnerability has been resolved:

ethtool: check device is present when getting link settings

A sysfs reader can race with a device reset or removal, attempting to read device state when the device is not actually present. eg:

 [exception RIP: qed_get_current_link+17]

#8 [ffffb9e4f2907c48] qedegetlink_ksettings at ffffffffc07a994a [qede] #9 [ffffb9e4f2907cd8] __rhcallgetlinkksettings at ffffffff992b01a3 #10 [ffffb9e4f2907d38] __ethtoolgetlinkksettings at ffffffff992b04e4 #11 [ffffb9e4f2907d90] duplexshow at ffffffff99260300 #12 [ffffb9e4f2907e38] devattrshow at ffffffff9905a01c #13 [ffffb9e4f2907e50] sysfskfseqshow at ffffffff98e0145b #14 [ffffb9e4f2907e68] seqread at ffffffff98d902e3 #15 [ffffb9e4f2907ec8] vfsread at ffffffff98d657d1 #16 [ffffb9e4f2907f00] ksysread at ffffffff98d65c3f #17 [ffffb9e4f2907f38] dosyscall64 at ffffffff98a052fb

crash> struct net_device.state ffff9a9d21336000 state = 5,

state 5 is __LINKSTATESTART (0b1) and __LINKSTATENOCARRIER (0b100). The device is not present, note lack of __LINKSTATEPRESENT (0b10).

This is the same sort of panic as observed in commit 4224cfd7fb65 ("net-sysfs: add check for netdevice being present to speed_show").

There are many other callers of _ethtoolgetlinkksettings() which don't have a device presence check.

Move this check into ethtool to protect all callers.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46679.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d519e17e2d01a0ee9abe083019532061b4438065
Fixed
ec7b4f7f644018ac293cb1b02528a40a32917e62
Fixed
842a40c7273ba1c1cb30dda50405b328de1d860e
Fixed
7a8d98b6d6484d3ad358510366022da080c37cbc
Fixed
9bba5955eed160102114d4cc00c3d399be9bdae4
Fixed
94ab317024ba373d37340893d1c0358638935fbb
Fixed
1d6d9b5b1b95bfeccb84386a51b7e6c510ec13b2
Fixed
a699781c79ecf6cfe67fb00a0331b4088c7c8466

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46679.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.33
Fixed
5.4.283
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.225
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.166
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.108
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.49
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.10.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46679.json"