CVE-2024-50258

In the Linux kernel, the following vulnerability has been resolved: net: fix crash when config small gso_max_size/gso_ipv4_max_size Config a small gso_max_size/gso_ipv4_max_size will lead to an underflow in sk_dst_gso_max_size(), which may trigger a BUG_ON crash, because sk->sk_gso_max_size would be much bigger than device limits. Call Trace: tcp_write_xmit tso_segs = tcp_init_tso_segs(skb, mss_now); tcp_set_skb_tso_segs tcp_skb_pcount_set // skb->len = 524288, mss_now = 8 // u16 tso_segs = 524288/8 = 65535 -> 0 tso_segs = DIV_ROUND_UP(skb->len, mss_now) BUG_ON(!tso_segs) Add check for the minimum value of gso_max_size and gso_ipv4_max_size.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*

History

14 Nov 2024, 18:12

Type Values Removed Values Added
CWE CWE-191
References () https://git.kernel.org/stable/c/9ab5cf19fb0e4680f95e506d6c544259bf1111c4 - () https://git.kernel.org/stable/c/9ab5cf19fb0e4680f95e506d6c544259bf1111c4 - Patch
References () https://git.kernel.org/stable/c/ac5977001eee7660c643f8e07a2de9001990b7b8 - () https://git.kernel.org/stable/c/ac5977001eee7660c643f8e07a2de9001990b7b8 - Patch
References () https://git.kernel.org/stable/c/e72fd1389a5364bc6aa6312ecf30bdb5891b9486 - () https://git.kernel.org/stable/c/e72fd1389a5364bc6aa6312ecf30bdb5891b9486 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

12 Nov 2024, 13:56

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: se corrige el fallo al configurar un gso_max_size/gso_ipv4_max_size pequeño. Configurar un gso_max_size/gso_ipv4_max_size pequeño provocará un desbordamiento en sk_dst_gso_max_size(), lo que puede desencadenar un fallo BUG_ON, porque sk->sk_gso_max_size sería mucho mayor que los límites del dispositivo. Seguimiento de llamadas: tcp_write_xmit tso_segs = tcp_init_tso_segs(skb, mss_now); tcp_set_skb_tso_segs tcp_skb_pcount_set // skb->len = 524288, mss_now = 8 // u16 tso_segs = 524288/8 = 65535 -> 0 tso_segs = DIV_ROUND_UP(skb->len, mss_now) BUG_ON(!tso_segs) Agregar verificación para el valor mínimo de gso_max_size y gso_ipv4_max_size.

09 Nov 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-09 11:15

Updated : 2024-11-14 18:12


NVD link : CVE-2024-50258

Mitre link : CVE-2024-50258

CVE.ORG link : CVE-2024-50258


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)