In the Linux kernel, the following vulnerability has been resolved:
tunnels: fix out of bounds access when building IPv6 PMTU error
If the ICMPv6 error is built from a non-linear skb we get the following
splat,
BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240
Read of size 4 at addr ffff88811d402c80 by task netperf/820
CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543
...
kasan_report+0xd8/0x110
do_csum+0x220/0x240
csum_partial+0xc/0x20
skb_tunnel_check_pmtu+0xeb9/0x3280
vxlan_xmit_one+0x14c2/0x4080
vxlan_xmit+0xf61/0x5c00
dev_hard_start_xmit+0xfb/0x510
__dev_queue_xmit+0x7cd/0x32a0
br_dev_queue_push_xmit+0x39d/0x6a0
Use skb_checksum instead of csum_partial who cannot deal with non-linear
SKBs.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
03 Mar 2025, 17:33
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux Debian debian Linux Debian |
|
References | () https://git.kernel.org/stable/c/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1 - Patch | |
References | () https://git.kernel.org/stable/c/7dc9feb8b1705cf00de20563b6bc4831f4c99dab - Patch | |
References | () https://git.kernel.org/stable/c/d75abeec401f8c86b470e7028a13fcdc87e5dd06 - Patch | |
References | () https://git.kernel.org/stable/c/d964dd1bc1452594b4207d9229c157d9386e5d8a - Patch | |
References | () https://git.kernel.org/stable/c/e37cde7a5716466ff2a76f7f27f0a29b05b9a732 - Patch | |
References | () https://git.kernel.org/stable/c/e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
CWE | CWE-125 |
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1 - | |
References | () https://git.kernel.org/stable/c/7dc9feb8b1705cf00de20563b6bc4831f4c99dab - | |
References | () https://git.kernel.org/stable/c/d75abeec401f8c86b470e7028a13fcdc87e5dd06 - | |
References | () https://git.kernel.org/stable/c/d964dd1bc1452594b4207d9229c157d9386e5d8a - | |
References | () https://git.kernel.org/stable/c/e37cde7a5716466ff2a76f7f27f0a29b05b9a732 - | |
References | () https://git.kernel.org/stable/c/e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d - |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Apr 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-02 07:15
Updated : 2025-03-03 17:33
NVD link : CVE-2024-26665
Mitre link : CVE-2024-26665
CVE.ORG link : CVE-2024-26665
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read