
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-38538 was discovered on June 19, 2024, affecting the Linux kernel's bridge device xmit path. The vulnerability involves an uninitialized value error triggered by syzbot when sending a short packet (less than ETH_HLEN bytes) through the bridge device's transmission path (Ubuntu Security).
The vulnerability occurs in the bridge device's xmit path when handling packets shorter than the Ethernet header length (ETHHLEN bytes). The issue manifests as an uninitialized value error in the brdevxmit function at net/bridge/brdevice.c:65. The CVSS 3.1 Base Score is 5.5, with Local attack vector, Low attack complexity, and Low privileges required (Oracle Linux Bulletin).
The vulnerability affects the packet transmission functionality in Linux bridge devices. When exploited, it can lead to potential system instability or denial of service conditions due to the handling of malformed packets (Rapid7 DB).
Multiple Linux distributions have released patches to address this vulnerability. Ubuntu has fixed this in various kernel versions including 6.8.0-40.40 for noble, 5.15.0-127.137 for jammy, and 5.4.0-202.222 for focal. Oracle Linux has also released security updates to address this vulnerability (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."