CVE-2024-35890
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/05/2024
Last modified:
24/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
gro: fix ownership transfer<br />
<br />
If packets are GROed with fraglist they might be segmented later on and<br />
continue their journey in the stack. In skb_segment_list those skbs can<br />
be reused as-is. This is an issue as their destructor was removed in<br />
skb_gro_receive_list but not the reference to their socket, and then<br />
they can&#39;t be orphaned. Fix this by also removing the reference to the<br />
socket.<br />
<br />
For example this could be observed,<br />
<br />
kernel BUG at include/linux/skbuff.h:3131! (skb_orphan)<br />
RIP: 0010:ip6_rcv_core+0x11bc/0x19a0<br />
Call Trace:<br />
ipv6_list_rcv+0x250/0x3f0<br />
__netif_receive_skb_list_core+0x49d/0x8f0<br />
netif_receive_skb_list_internal+0x634/0xd40<br />
napi_complete_done+0x1d2/0x7d0<br />
gro_cell_poll+0x118/0x1f0<br />
<br />
A similar construction is found in skb_gro_receive, apply the same<br />
change there.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.154 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.85 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.26 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2eeab8c47c3c0276e0746bc382f405c9a236a5ad
- https://git.kernel.org/stable/c/5b3b67f731296027cceb3efad881ae281213f86f
- https://git.kernel.org/stable/c/d225b0ac96dc40d7e8ae2bc227eb2c56e130975f
- https://git.kernel.org/stable/c/ed4cccef64c1d0d5b91e69f7a8a6697c3a865486
- https://git.kernel.org/stable/c/fc126c1d51e9552eacd2d717b9ffe9262a8a4cd6
- https://git.kernel.org/stable/c/2eeab8c47c3c0276e0746bc382f405c9a236a5ad
- https://git.kernel.org/stable/c/5b3b67f731296027cceb3efad881ae281213f86f
- https://git.kernel.org/stable/c/d225b0ac96dc40d7e8ae2bc227eb2c56e130975f
- https://git.kernel.org/stable/c/ed4cccef64c1d0d5b91e69f7a8a6697c3a865486
- https://git.kernel.org/stable/c/fc126c1d51e9552eacd2d717b9ffe9262a8a4cd6
- https://security.netapp.com/advisory/ntap-20250509-0008/



