CVE-2024-41090
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
29/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tap: add missing verification for short frame<br />
<br />
The cited commit missed to check against the validity of the frame length<br />
in the tap_get_user_xdp() path, which could cause a corrupted skb to be<br />
sent downstack. Even before the skb is transmitted, the<br />
tap_get_user_xdp()-->skb_set_network_header() may assume the size is more<br />
than ETH_HLEN. Once transmitted, this could either cause out-of-bound<br />
access beyond the actual length, or confuse the underlayer with incorrect<br />
or inconsistent header length in the skb metadata.<br />
<br />
In the alternative path, tap_get_user() already prohibits short frame which<br />
has the length less than Ethernet header size from being transmitted.<br />
<br />
This is to drop any frame shorter than the Ethernet header size just like<br />
how tap_get_user() does.<br />
<br />
CVE: CVE-2024-41090
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.281 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.223 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.164 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.102 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.43 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.10 (including) | 6.10.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/73d462a38d5f782b7c872fe9ae8393d9ef5483da
- https://git.kernel.org/stable/c/7431144b406ae82807eb87d8c98e518475b0450f
- https://git.kernel.org/stable/c/8be915fc5ff9a5e296f6538be12ea75a1a93bdea
- https://git.kernel.org/stable/c/aa6a5704cab861c9b2ae9f475076e1881e87f5aa
- https://git.kernel.org/stable/c/e1a786b9bbb767fd1c922d424aaa8078cc542309
- https://git.kernel.org/stable/c/e5e5e63c506b93b89b01f522b6a7343585f784e6
- https://git.kernel.org/stable/c/ed7f2afdd0e043a397677e597ced0830b83ba0b3
- https://git.kernel.org/stable/c/ee93e6da30377cf2a75e16cd32bb9fcd86a61c46
- https://git.kernel.org/stable/c/73d462a38d5f782b7c872fe9ae8393d9ef5483da
- https://git.kernel.org/stable/c/7431144b406ae82807eb87d8c98e518475b0450f
- https://git.kernel.org/stable/c/8be915fc5ff9a5e296f6538be12ea75a1a93bdea
- https://git.kernel.org/stable/c/aa6a5704cab861c9b2ae9f475076e1881e87f5aa
- https://git.kernel.org/stable/c/e1a786b9bbb767fd1c922d424aaa8078cc542309
- https://git.kernel.org/stable/c/e5e5e63c506b93b89b01f522b6a7343585f784e6
- https://git.kernel.org/stable/c/ed7f2afdd0e043a397677e597ced0830b83ba0b3
- https://git.kernel.org/stable/c/ee93e6da30377cf2a75e16cd32bb9fcd86a61c46
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



