CVE-2024-41066
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ibmvnic: Add tx check to prevent skb leak<br />
<br />
Below is a summary of how the driver stores a reference to an skb during<br />
transmit:<br />
tx_buff[free_map[consumer_index]]->skb = new_skb;<br />
free_map[consumer_index] = IBMVNIC_INVALID_MAP;<br />
consumer_index ++;<br />
Where variable data looks like this:<br />
free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3]<br />
consumer_index^<br />
tx_buff == [skb=null, skb=, skb=, skb=null, skb=null]<br />
<br />
The driver has checks to ensure that free_map[consumer_index] pointed to<br />
a valid index but there was no check to ensure that this index pointed<br />
to an unused/null skb address. So, if, by some chance, our free_map and<br />
tx_buff lists become out of sync then we were previously risking an<br />
skb memory leak. This could then cause tcp congestion control to stop<br />
sending packets, eventually leading to ETIMEDOUT.<br />
<br />
Therefore, add a conditional to ensure that the skb address is null. If<br />
not then warn the user (because this is still a bug that should be<br />
patched) and free the old pointer to prevent memleak/tcp problems.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.101 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0983d288caf984de0202c66641577b739caad561
- https://git.kernel.org/stable/c/16ad1557cae582e79bb82dddd612d9bdfaa11d4c
- https://git.kernel.org/stable/c/267c61c4afed0ff9a2e83462abad3f41d8ca1f06
- https://git.kernel.org/stable/c/e7b75def33eae61ddaad6cb616c517dc3882eb2a
- https://git.kernel.org/stable/c/0983d288caf984de0202c66641577b739caad561
- https://git.kernel.org/stable/c/16ad1557cae582e79bb82dddd612d9bdfaa11d4c
- https://git.kernel.org/stable/c/267c61c4afed0ff9a2e83462abad3f41d8ca1f06
- https://git.kernel.org/stable/c/e7b75def33eae61ddaad6cb616c517dc3882eb2a
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



