CVE-2024-38586
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-38586 affects the Linux kernel's r8169 network driver, specifically impacting the RTL8125b network adapter. The vulnerability was discovered in June 2024 and involves a potential ring buffer corruption issue when transmitting small fragmented packets (NVD).

Technical details

The vulnerability occurs when transmitting small fragmented packets on the RTL8125b network adapter, where invalid entries could be inserted into the transmit ring buffer. This issue stems from rtl8169startxmit() not detecting changes to nrfrags that may happen when small packets are padded in rtl8169tsocsumv2() to work around hardware quirks. The bug can lead to calls to dmaunmapsingle() with a null address (Kernel Commit).

Impact

The vulnerability can result in ring buffer corruption and potential system instability when processing network packets through affected RTL8125b network adapters (NVD).

Mitigation and workarounds

The issue has been fixed by postponing the inspection of nr_frags until after any padding has been applied. The fix is available in various Linux kernel versions through security updates. Red Hat has included the fix in their RHSA-2024:4583 security advisory (Red Hat).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40343MEDIUM6.4
  • Linux KernelLinux Kernel
  • linux-aws-fips
NoYesDec 09, 2025
CVE-2025-40342MEDIUM6.4
  • Linux KernelLinux Kernel
  • linux-azure-5.4
NoYesDec 09, 2025
CVE-2025-40341MEDIUM5.1
  • Linux KernelLinux Kernel
  • libperf-devel
NoYesDec 09, 2025
CVE-2025-40345N/AN/A
  • Linux KernelLinux Kernel
  • kernel-firmware
NoYesDec 12, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • linux-riscv
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management