CVE-2024-40996

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/07/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Avoid splat in pskb_pull_reason<br /> <br /> syzkaller builds (CONFIG_DEBUG_NET=y) frequently trigger a debug<br /> hint in pskb_may_pull.<br /> <br /> We&amp;#39;d like to retain this debug check because it might hint at integer<br /> overflows and other issues (kernel code should pull headers, not huge<br /> value).<br /> <br /> In bpf case, this splat isn&amp;#39;t interesting at all: such (nonsensical)<br /> bpf programs are typically generated by a fuzzer anyway.<br /> <br /> Do what Eric suggested and suppress such warning.<br /> <br /> For CONFIG_DEBUG_NET=n we don&amp;#39;t need the extra check because<br /> pskb_may_pull will do the right thing: return an error without the<br /> WARN() backtrace.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.86 (including) 6.1.96 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.27 (including) 6.6.36 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.9.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*