In the Linux kernel, the following vulnerability has been resolved:
gso: fix udp gso fraglist segmentation after pull from frag_list
Detect gso fraglist skbs with corrupted geometry (see below) and pass these to skbsegment instead of skbsegment_list, as the first can segment them correctly.
Valid SKBGSOFRAGLIST skbs - consist of two or more segments - the headskb holds the protocol headers plus first gsosize - one or more fraglist skbs hold exactly one segment - all but the last must be gsosize
Optional datapath hooks such as NAT and BPF (bpfskbpull_data) can modify these skbs, breaking these invariants.
In extreme cases they pull all data into skb linear. For UDP, this causes a NULL ptr deref in _udpv4gsosegmentlistcsum at udphdr(seg->next)->dest.
Detect invalid geometry due to pull, by checking headskb size. Don't just drop, as this may blackhole a destination. Convert to be able to pass to regular skbsegment.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49978.json"
}[
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2024-49978-0dfe2ebe",
"target": {
"file": "net/ipv4/udp_offload.c",
"function": "__udp_gso_segment"
},
"digest": {
"length": 2229.0,
"function_hash": "125033651675558222220431025900010575757"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@af3122f5fdc0d00581d6e598a668df6bf54c9daa"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-49978-8485dcc0",
"target": {
"file": "net/ipv4/udp_offload.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"258608881922496187375083036316812594007",
"315624676882479959601694061199625802499",
"227276370998406326154663633092109426768",
"159649517053407694346759448513302989556",
"165880926910251874103275216463484228190"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@af3122f5fdc0d00581d6e598a668df6bf54c9daa"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49978.json"