CVE-2024-46834

Source
https://cve.org/CVERecord?id=CVE-2024-46834
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46834.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-46834
Downstream
Related
Published
2024-09-27T12:39:31.110Z
Modified
2026-03-11T07:45:36.606822Z
Summary
ethtool: fail closed if we can't get max channel used in indirection tables
Details

In the Linux kernel, the following vulnerability has been resolved:

ethtool: fail closed if we can't get max channel used in indirection tables

Commit 0d1b7d6c9274 ("bnxt: fix crashes when reducing ring count with active RSS contexts") proves that allowing indirection table to contain channels with out of bounds IDs may lead to crashes. Currently the max channel check in the core gets skipped if driver can't fetch the indirection table or when we can't allocate memory.

Both of those conditions should be extremely rare but if they do happen we should try to be safe and fail the channel change.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46834.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d4ab4286276fcd6c155bafdf4422b712068d2516
Fixed
101737d8b88dbd4be6010bac398fe810f1950036
Fixed
2899d58462ba868287d6ff3acad3675e7adf934f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46834.json"