CVE-2024-49948

In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init() One path takes care of SKB_GSO_DODGY, assuming skb->len is bigger than hdr_len. virtio_net_hdr_to_skb() does not fully dissect TCP headers, it only make sure it is at least 20 bytes. It is possible for an user to provide a malicious 'GSO' packet, total length of 80 bytes. - 20 bytes of IPv4 header - 60 bytes TCP header - a small gso_size like 8 virtio_net_hdr_to_skb() would declare this packet as a normal GSO packet, because it would see 40 bytes of payload, bigger than gso_size. We need to make detect this case to not underflow qdisc_skb_cb(skb)->pkt_len.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*

History

12 Nov 2024, 21:19

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/1eebe602a8d8264a12e35e39d0645fa88dbbacdd - () https://git.kernel.org/stable/c/1eebe602a8d8264a12e35e39d0645fa88dbbacdd - Patch
References () https://git.kernel.org/stable/c/2415f465730e48b6e38da1c7c097317bf5dd2d20 - () https://git.kernel.org/stable/c/2415f465730e48b6e38da1c7c097317bf5dd2d20 - Patch
References () https://git.kernel.org/stable/c/27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4 - () https://git.kernel.org/stable/c/27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4 - Patch
References () https://git.kernel.org/stable/c/473426a1d53a68dd1e718e6cd00d57936993fa6c - () https://git.kernel.org/stable/c/473426a1d53a68dd1e718e6cd00d57936993fa6c - Patch
References () https://git.kernel.org/stable/c/566a931a1436d0e0ad13708ea55479b95426213c - () https://git.kernel.org/stable/c/566a931a1436d0e0ad13708ea55479b95426213c - Patch
References () https://git.kernel.org/stable/c/9b0ee571d20a238a22722126abdfde61f1b2bdd0 - () https://git.kernel.org/stable/c/9b0ee571d20a238a22722126abdfde61f1b2bdd0 - Patch
References () https://git.kernel.org/stable/c/ab9a9a9e9647392a19e7a885b08000e89c86b535 - () https://git.kernel.org/stable/c/ab9a9a9e9647392a19e7a885b08000e89c86b535 - Patch
References () https://git.kernel.org/stable/c/d7d1a28f5dd57b4d83def876f8d7b4403bd37df9 - () https://git.kernel.org/stable/c/d7d1a28f5dd57b4d83def876f8d7b4403bd37df9 - Patch
References () https://git.kernel.org/stable/c/ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2 - () https://git.kernel.org/stable/c/ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2 - Patch

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/473426a1d53a68dd1e718e6cd00d57936993fa6c -
  • () https://git.kernel.org/stable/c/d7d1a28f5dd57b4d83def876f8d7b4403bd37df9 -

23 Oct 2024, 15:13

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: añadir más comprobaciones de cordura a qdisc_pkt_len_init() Una ruta se encarga de SKB_GSO_DODGY, asumiendo que skb->len es más grande que hdr_len. virtio_net_hdr_to_skb() no disecciona completamente los encabezados TCP, solo se asegura de que tengan al menos 20 bytes. Es posible que un usuario proporcione un paquete 'GSO' malicioso, con una longitud total de 80 bytes. - 20 bytes de encabezado IPv4 - 60 bytes de encabezado TCP - un gso_size pequeño como 8 virtio_net_hdr_to_skb() declararía este paquete como un paquete GSO normal, porque vería 40 bytes de carga útil, más grande que gso_size. Necesitamos hacer que detecte este caso para no desbordar qdisc_skb_cb(skb)->pkt_len.

21 Oct 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 18:15

Updated : 2024-11-12 21:19


NVD link : CVE-2024-49948

Mitre link : CVE-2024-49948

CVE.ORG link : CVE-2024-49948


JSON object : View

Products Affected

linux

  • linux_kernel