cve-2024-49948
Vulnerability from cvelistv5
Published
2024-10-21 18:02
Modified
2024-12-19 09:29
Severity ?
EPSS score ?
0.02% (0.034)
Summary
In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init() One path takes care of SKB_GSO_DODGY, assuming skb->len is bigger than hdr_len. virtio_net_hdr_to_skb() does not fully dissect TCP headers, it only make sure it is at least 20 bytes. It is possible for an user to provide a malicious 'GSO' packet, total length of 80 bytes. - 20 bytes of IPv4 header - 60 bytes TCP header - a small gso_size like 8 virtio_net_hdr_to_skb() would declare this packet as a normal GSO packet, because it would see 40 bytes of payload, bigger than gso_size. We need to make detect this case to not underflow qdisc_skb_cb(skb)->pkt_len.
Impacted products
Vendor Product Version
Linux Linux Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Version: 1def9238d4aa2146924994aa4b7dc861f03b9362
Create a notification for this product.
   Linux Linux Version: 3.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-49948",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-22T13:36:47.619949Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-22T13:38:49.499Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "net/core/dev.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "d7d1a28f5dd57b4d83def876f8d7b4403bd37df9",
                     status: "affected",
                     version: "1def9238d4aa2146924994aa4b7dc861f03b9362",
                     versionType: "git",
                  },
                  {
                     lessThan: "473426a1d53a68dd1e718e6cd00d57936993fa6c",
                     status: "affected",
                     version: "1def9238d4aa2146924994aa4b7dc861f03b9362",
                     versionType: "git",
                  },
                  {
                     lessThan: "566a931a1436d0e0ad13708ea55479b95426213c",
                     status: "affected",
                     version: "1def9238d4aa2146924994aa4b7dc861f03b9362",
                     versionType: "git",
                  },
                  {
                     lessThan: "2415f465730e48b6e38da1c7c097317bf5dd2d20",
                     status: "affected",
                     version: "1def9238d4aa2146924994aa4b7dc861f03b9362",
                     versionType: "git",
                  },
                  {
                     lessThan: "27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4",
                     status: "affected",
                     version: "1def9238d4aa2146924994aa4b7dc861f03b9362",
                     versionType: "git",
                  },
                  {
                     lessThan: "9b0ee571d20a238a22722126abdfde61f1b2bdd0",
                     status: "affected",
                     version: "1def9238d4aa2146924994aa4b7dc861f03b9362",
                     versionType: "git",
                  },
                  {
                     lessThan: "ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2",
                     status: "affected",
                     version: "1def9238d4aa2146924994aa4b7dc861f03b9362",
                     versionType: "git",
                  },
                  {
                     lessThan: "1eebe602a8d8264a12e35e39d0645fa88dbbacdd",
                     status: "affected",
                     version: "1def9238d4aa2146924994aa4b7dc861f03b9362",
                     versionType: "git",
                  },
                  {
                     lessThan: "ab9a9a9e9647392a19e7a885b08000e89c86b535",
                     status: "affected",
                     version: "1def9238d4aa2146924994aa4b7dc861f03b9362",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "net/core/dev.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "3.9",
                  },
                  {
                     lessThan: "3.9",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "4.19.*",
                     status: "unaffected",
                     version: "4.19.323",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.4.*",
                     status: "unaffected",
                     version: "5.4.285",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.10.*",
                     status: "unaffected",
                     version: "5.10.227",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.15.*",
                     status: "unaffected",
                     version: "5.15.168",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.113",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.55",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.10.*",
                     status: "unaffected",
                     version: "6.10.14",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.11.*",
                     status: "unaffected",
                     version: "6.11.3",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.12",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: add more sanity checks to qdisc_pkt_len_init()\n\nOne path takes care of SKB_GSO_DODGY, assuming\nskb->len is bigger than hdr_len.\n\nvirtio_net_hdr_to_skb() does not fully dissect TCP headers,\nit only make sure it is at least 20 bytes.\n\nIt is possible for an user to provide a malicious 'GSO' packet,\ntotal length of 80 bytes.\n\n- 20 bytes of IPv4 header\n- 60 bytes TCP header\n- a small gso_size like 8\n\nvirtio_net_hdr_to_skb() would declare this packet as a normal\nGSO packet, because it would see 40 bytes of payload,\nbigger than gso_size.\n\nWe need to make detect this case to not underflow\nqdisc_skb_cb(skb)->pkt_len.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T09:29:55.468Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/d7d1a28f5dd57b4d83def876f8d7b4403bd37df9",
            },
            {
               url: "https://git.kernel.org/stable/c/473426a1d53a68dd1e718e6cd00d57936993fa6c",
            },
            {
               url: "https://git.kernel.org/stable/c/566a931a1436d0e0ad13708ea55479b95426213c",
            },
            {
               url: "https://git.kernel.org/stable/c/2415f465730e48b6e38da1c7c097317bf5dd2d20",
            },
            {
               url: "https://git.kernel.org/stable/c/27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4",
            },
            {
               url: "https://git.kernel.org/stable/c/9b0ee571d20a238a22722126abdfde61f1b2bdd0",
            },
            {
               url: "https://git.kernel.org/stable/c/ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2",
            },
            {
               url: "https://git.kernel.org/stable/c/1eebe602a8d8264a12e35e39d0645fa88dbbacdd",
            },
            {
               url: "https://git.kernel.org/stable/c/ab9a9a9e9647392a19e7a885b08000e89c86b535",
            },
         ],
         title: "net: add more sanity checks to qdisc_pkt_len_init()",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-49948",
      datePublished: "2024-10-21T18:02:05.121Z",
      dateReserved: "2024-10-21T12:17:06.045Z",
      dateUpdated: "2024-12-19T09:29:55.468Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-49948\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T18:15:16.260\",\"lastModified\":\"2024-11-12T21:19:24.440\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: add more sanity checks to qdisc_pkt_len_init()\\n\\nOne path takes care of SKB_GSO_DODGY, assuming\\nskb->len is bigger than hdr_len.\\n\\nvirtio_net_hdr_to_skb() does not fully dissect TCP headers,\\nit only make sure it is at least 20 bytes.\\n\\nIt is possible for an user to provide a malicious 'GSO' packet,\\ntotal length of 80 bytes.\\n\\n- 20 bytes of IPv4 header\\n- 60 bytes TCP header\\n- a small gso_size like 8\\n\\nvirtio_net_hdr_to_skb() would declare this packet as a normal\\nGSO packet, because it would see 40 bytes of payload,\\nbigger than gso_size.\\n\\nWe need to make detect this case to not underflow\\nqdisc_skb_cb(skb)->pkt_len.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: añadir más comprobaciones de cordura a qdisc_pkt_len_init() Una ruta se encarga de SKB_GSO_DODGY, asumiendo que skb->len es más grande que hdr_len. virtio_net_hdr_to_skb() no disecciona completamente los encabezados TCP, solo se asegura de que tengan al menos 20 bytes. Es posible que un usuario proporcione un paquete 'GSO' malicioso, con una longitud total de 80 bytes. - 20 bytes de encabezado IPv4 - 60 bytes de encabezado TCP - un gso_size pequeño como 8 virtio_net_hdr_to_skb() declararía este paquete como un paquete GSO normal, porque vería 40 bytes de carga útil, más grande que gso_size. Necesitamos hacer que detecte este caso para no desbordar qdisc_skb_cb(skb)->pkt_len.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.9\",\"versionEndExcluding\":\"4.19.323\",\"matchCriteriaId\":\"C4858BA8-F6CA-4A65-9871-EAC1E8C606C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.285\",\"matchCriteriaId\":\"B5A89369-320F-47FC-8695-56F61F87E4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.227\",\"matchCriteriaId\":\"795A3EE6-0CAB-4409-A903-151C94ACECC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"4D51C05D-455B-4D8D-89E7-A58E140B864C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.55\",\"matchCriteriaId\":\"E90B9576-56C4-47BC-AAB0-C5B2D438F5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.14\",\"matchCriteriaId\":\"4C16BCE0-FFA0-4599-BE0A-1FD65101C021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.3\",\"matchCriteriaId\":\"54D9C704-D679-41A7-9C40-10A6B1E7FFE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F361E1D-580F-4A2D-A509-7615F73167A1\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1eebe602a8d8264a12e35e39d0645fa88dbbacdd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2415f465730e48b6e38da1c7c097317bf5dd2d20\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/473426a1d53a68dd1e718e6cd00d57936993fa6c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/566a931a1436d0e0ad13708ea55479b95426213c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9b0ee571d20a238a22722126abdfde61f1b2bdd0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ab9a9a9e9647392a19e7a885b08000e89c86b535\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d7d1a28f5dd57b4d83def876f8d7b4403bd37df9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-49948\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-22T13:36:47.619949Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-22T13:36:51.289Z\"}}], \"cna\": {\"title\": \"net: add more sanity checks to qdisc_pkt_len_init()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"d7d1a28f5dd57b4d83def876f8d7b4403bd37df9\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"473426a1d53a68dd1e718e6cd00d57936993fa6c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"566a931a1436d0e0ad13708ea55479b95426213c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"2415f465730e48b6e38da1c7c097317bf5dd2d20\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"9b0ee571d20a238a22722126abdfde61f1b2bdd0\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"1eebe602a8d8264a12e35e39d0645fa88dbbacdd\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1def9238d4aa2146924994aa4b7dc861f03b9362\", \"lessThan\": \"ab9a9a9e9647392a19e7a885b08000e89c86b535\", \"versionType\": \"git\"}], \"programFiles\": [\"net/core/dev.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.9\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.9\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.323\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.285\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.227\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.55\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.14\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/core/dev.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/d7d1a28f5dd57b4d83def876f8d7b4403bd37df9\"}, {\"url\": \"https://git.kernel.org/stable/c/473426a1d53a68dd1e718e6cd00d57936993fa6c\"}, {\"url\": \"https://git.kernel.org/stable/c/566a931a1436d0e0ad13708ea55479b95426213c\"}, {\"url\": \"https://git.kernel.org/stable/c/2415f465730e48b6e38da1c7c097317bf5dd2d20\"}, {\"url\": \"https://git.kernel.org/stable/c/27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4\"}, {\"url\": \"https://git.kernel.org/stable/c/9b0ee571d20a238a22722126abdfde61f1b2bdd0\"}, {\"url\": \"https://git.kernel.org/stable/c/ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2\"}, {\"url\": \"https://git.kernel.org/stable/c/1eebe602a8d8264a12e35e39d0645fa88dbbacdd\"}, {\"url\": \"https://git.kernel.org/stable/c/ab9a9a9e9647392a19e7a885b08000e89c86b535\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: add more sanity checks to qdisc_pkt_len_init()\\n\\nOne path takes care of SKB_GSO_DODGY, assuming\\nskb->len is bigger than hdr_len.\\n\\nvirtio_net_hdr_to_skb() does not fully dissect TCP headers,\\nit only make sure it is at least 20 bytes.\\n\\nIt is possible for an user to provide a malicious 'GSO' packet,\\ntotal length of 80 bytes.\\n\\n- 20 bytes of IPv4 header\\n- 60 bytes TCP header\\n- a small gso_size like 8\\n\\nvirtio_net_hdr_to_skb() would declare this packet as a normal\\nGSO packet, because it would see 40 bytes of payload,\\nbigger than gso_size.\\n\\nWe need to make detect this case to not underflow\\nqdisc_skb_cb(skb)->pkt_len.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:29:55.468Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-49948\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:29:55.468Z\", \"dateReserved\": \"2024-10-21T12:17:06.045Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T18:02:05.121Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.