cve-2024-49948
Vulnerability from cvelistv5
Published
2024-10-21 18:02
Modified
2024-12-19 09:29
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init() One path takes care of SKB_GSO_DODGY, assuming skb->len is bigger than hdr_len. virtio_net_hdr_to_skb() does not fully dissect TCP headers, it only make sure it is at least 20 bytes. It is possible for an user to provide a malicious 'GSO' packet, total length of 80 bytes. - 20 bytes of IPv4 header - 60 bytes TCP header - a small gso_size like 8 virtio_net_hdr_to_skb() would declare this packet as a normal GSO packet, because it would see 40 bytes of payload, bigger than gso_size. We need to make detect this case to not underflow qdisc_skb_cb(skb)->pkt_len.
Impacted products
Vendor Product Version
Linux Linux Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Create a notification for this product.
   Linux Linux Version: 3.9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-49948",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T13:36:47.619949Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T13:38:49.499Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/core/dev.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "d7d1a28f5dd57b4d83def876f8d7b4403bd37df9",
              "status": "affected",
              "version": "1def9238d4aa2146924994aa4b7dc861f03b9362",
              "versionType": "git"
            },
            {
              "lessThan": "473426a1d53a68dd1e718e6cd00d57936993fa6c",
              "status": "affected",
              "version": "1def9238d4aa2146924994aa4b7dc861f03b9362",
              "versionType": "git"
            },
            {
              "lessThan": "566a931a1436d0e0ad13708ea55479b95426213c",
              "status": "affected",
              "version": "1def9238d4aa2146924994aa4b7dc861f03b9362",
              "versionType": "git"
            },
            {
              "lessThan": "2415f465730e48b6e38da1c7c097317bf5dd2d20",
              "status": "affected",
              "version": "1def9238d4aa2146924994aa4b7dc861f03b9362",
              "versionType": "git"
            },
            {
              "lessThan": "27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4",
              "status": "affected",
              "version": "1def9238d4aa2146924994aa4b7dc861f03b9362",
              "versionType": "git"
            },
            {
              "lessThan": "9b0ee571d20a238a22722126abdfde61f1b2bdd0",
              "status": "affected",
              "version": "1def9238d4aa2146924994aa4b7dc861f03b9362",
              "versionType": "git"
            },
            {
              "lessThan": "ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2",
              "status": "affected",
              "version": "1def9238d4aa2146924994aa4b7dc861f03b9362",
              "versionType": "git"
            },
            {
              "lessThan": "1eebe602a8d8264a12e35e39d0645fa88dbbacdd",
              "status": "affected",
              "version": "1def9238d4aa2146924994aa4b7dc861f03b9362",
              "versionType": "git"
            },
            {
              "lessThan": "ab9a9a9e9647392a19e7a885b08000e89c86b535",
              "status": "affected",
              "version": "1def9238d4aa2146924994aa4b7dc861f03b9362",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/core/dev.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.9"
            },
            {
              "lessThan": "3.9",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.323",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.285",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.227",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.168",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.113",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.55",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.14",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.12",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: add more sanity checks to qdisc_pkt_len_init()\n\nOne path takes care of SKB_GSO_DODGY, assuming\nskb-\u003elen is bigger than hdr_len.\n\nvirtio_net_hdr_to_skb() does not fully dissect TCP headers,\nit only make sure it is at least 20 bytes.\n\nIt is possible for an user to provide a malicious \u0027GSO\u0027 packet,\ntotal length of 80 bytes.\n\n- 20 bytes of IPv4 header\n- 60 bytes TCP header\n- a small gso_size like 8\n\nvirtio_net_hdr_to_skb() would declare this packet as a normal\nGSO packet, because it would see 40 bytes of payload,\nbigger than gso_size.\n\nWe need to make detect this case to not underflow\nqdisc_skb_cb(skb)-\u003epkt_len."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:29:55.468Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/d7d1a28f5dd57b4d83def876f8d7b4403bd37df9"
        },
        {
          "url": "https://git.kernel.org/stable/c/473426a1d53a68dd1e718e6cd00d57936993fa6c"
        },
        {
          "url": "https://git.kernel.org/stable/c/566a931a1436d0e0ad13708ea55479b95426213c"
        },
        {
          "url": "https://git.kernel.org/stable/c/2415f465730e48b6e38da1c7c097317bf5dd2d20"
        },
        {
          "url": "https://git.kernel.org/stable/c/27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4"
        },
        {
          "url": "https://git.kernel.org/stable/c/9b0ee571d20a238a22722126abdfde61f1b2bdd0"
        },
        {
          "url": "https://git.kernel.org/stable/c/ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2"
        },
        {
          "url": "https://git.kernel.org/stable/c/1eebe602a8d8264a12e35e39d0645fa88dbbacdd"
        },
        {
          "url": "https://git.kernel.org/stable/c/ab9a9a9e9647392a19e7a885b08000e89c86b535"
        }
      ],
      "title": "net: add more sanity checks to qdisc_pkt_len_init()",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-49948",
    "datePublished": "2024-10-21T18:02:05.121Z",
    "dateReserved": "2024-10-21T12:17:06.045Z",
    "dateUpdated": "2024-12-19T09:29:55.468Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-49948\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T18:15:16.260\",\"lastModified\":\"2024-11-12T21:19:24.440\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: add more sanity checks to qdisc_pkt_len_init()\\n\\nOne path takes care of SKB_GSO_DODGY, assuming\\nskb-\u003elen is bigger than hdr_len.\\n\\nvirtio_net_hdr_to_skb() does not fully dissect TCP headers,\\nit only make sure it is at least 20 bytes.\\n\\nIt is possible for an user to provide a malicious \u0027GSO\u0027 packet,\\ntotal length of 80 bytes.\\n\\n- 20 bytes of IPv4 header\\n- 60 bytes TCP header\\n- a small gso_size like 8\\n\\nvirtio_net_hdr_to_skb() would declare this packet as a normal\\nGSO packet, because it would see 40 bytes of payload,\\nbigger than gso_size.\\n\\nWe need to make detect this case to not underflow\\nqdisc_skb_cb(skb)-\u003epkt_len.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: a\u00f1adir m\u00e1s comprobaciones de cordura a qdisc_pkt_len_init() Una ruta se encarga de SKB_GSO_DODGY, asumiendo que skb-\u0026gt;len es m\u00e1s grande que hdr_len. virtio_net_hdr_to_skb() no disecciona completamente los encabezados TCP, solo se asegura de que tengan al menos 20 bytes. Es posible que un usuario proporcione un paquete \u0027GSO\u0027 malicioso, con una longitud total de 80 bytes. - 20 bytes de encabezado IPv4 - 60 bytes de encabezado TCP - un gso_size peque\u00f1o como 8 virtio_net_hdr_to_skb() declarar\u00eda este paquete como un paquete GSO normal, porque ver\u00eda 40 bytes de carga \u00fatil, m\u00e1s grande que gso_size. Necesitamos hacer que detecte este caso para no desbordar qdisc_skb_cb(skb)-\u0026gt;pkt_len.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.9\",\"versionEndExcluding\":\"4.19.323\",\"matchCriteriaId\":\"C4858BA8-F6CA-4A65-9871-EAC1E8C606C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.285\",\"matchCriteriaId\":\"B5A89369-320F-47FC-8695-56F61F87E4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.227\",\"matchCriteriaId\":\"795A3EE6-0CAB-4409-A903-151C94ACECC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"4D51C05D-455B-4D8D-89E7-A58E140B864C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.55\",\"matchCriteriaId\":\"E90B9576-56C4-47BC-AAB0-C5B2D438F5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.14\",\"matchCriteriaId\":\"4C16BCE0-FFA0-4599-BE0A-1FD65101C021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.3\",\"matchCriteriaId\":\"54D9C704-D679-41A7-9C40-10A6B1E7FFE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F361E1D-580F-4A2D-A509-7615F73167A1\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1eebe602a8d8264a12e35e39d0645fa88dbbacdd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2415f465730e48b6e38da1c7c097317bf5dd2d20\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/473426a1d53a68dd1e718e6cd00d57936993fa6c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/566a931a1436d0e0ad13708ea55479b95426213c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9b0ee571d20a238a22722126abdfde61f1b2bdd0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ab9a9a9e9647392a19e7a885b08000e89c86b535\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d7d1a28f5dd57b4d83def876f8d7b4403bd37df9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-49948\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-22T13:36:47.619949Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-22T13:36:51.289Z\"}}], \"cna\": {\"title\": \"net: add more sanity checks to qdisc_pkt_len_init()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"d7d1a28f5dd57b4d83def876f8d7b4403bd37df9\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"473426a1d53a68dd1e718e6cd00d57936993fa6c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"566a931a1436d0e0ad13708ea55479b95426213c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"2415f465730e48b6e38da1c7c097317bf5dd2d20\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"9b0ee571d20a238a22722126abdfde61f1b2bdd0\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"1eebe602a8d8264a12e35e39d0645fa88dbbacdd\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"ab9a9a9e9647392a19e7a885b08000e89c86b535\", \"versionType\": \"git\"}], \"programFiles\": [\"net/core/dev.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.9\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.9\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.323\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.285\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.227\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.55\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.14\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/core/dev.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/d7d1a28f5dd57b4d83def876f8d7b4403bd37df9\"}, {\"url\": \"https://git.kernel.org/stable/c/473426a1d53a68dd1e718e6cd00d57936993fa6c\"}, {\"url\": \"https://git.kernel.org/stable/c/566a931a1436d0e0ad13708ea55479b95426213c\"}, {\"url\": \"https://git.kernel.org/stable/c/2415f465730e48b6e38da1c7c097317bf5dd2d20\"}, {\"url\": \"https://git.kernel.org/stable/c/27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4\"}, {\"url\": \"https://git.kernel.org/stable/c/9b0ee571d20a238a22722126abdfde61f1b2bdd0\"}, {\"url\": \"https://git.kernel.org/stable/c/ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2\"}, {\"url\": \"https://git.kernel.org/stable/c/1eebe602a8d8264a12e35e39d0645fa88dbbacdd\"}, {\"url\": \"https://git.kernel.org/stable/c/ab9a9a9e9647392a19e7a885b08000e89c86b535\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: add more sanity checks to qdisc_pkt_len_init()\\n\\nOne path takes care of SKB_GSO_DODGY, assuming\\nskb-\u003elen is bigger than hdr_len.\\n\\nvirtio_net_hdr_to_skb() does not fully dissect TCP headers,\\nit only make sure it is at least 20 bytes.\\n\\nIt is possible for an user to provide a malicious \u0027GSO\u0027 packet,\\ntotal length of 80 bytes.\\n\\n- 20 bytes of IPv4 header\\n- 60 bytes TCP header\\n- a small gso_size like 8\\n\\nvirtio_net_hdr_to_skb() would declare this packet as a normal\\nGSO packet, because it would see 40 bytes of payload,\\nbigger than gso_size.\\n\\nWe need to make detect this case to not underflow\\nqdisc_skb_cb(skb)-\u003epkt_len.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:29:55.468Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-49948\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:29:55.468Z\", \"dateReserved\": \"2024-10-21T12:17:06.045Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T18:02:05.121Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.