CVE-2024-41090

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
29/07/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tap: add missing verification for short frame<br /> <br /> The cited commit missed to check against the validity of the frame length<br /> in the tap_get_user_xdp() path, which could cause a corrupted skb to be<br /> sent downstack. Even before the skb is transmitted, the<br /> tap_get_user_xdp()--&gt;skb_set_network_header() may assume the size is more<br /> than ETH_HLEN. Once transmitted, this could either cause out-of-bound<br /> access beyond the actual length, or confuse the underlayer with incorrect<br /> or inconsistent header length in the skb metadata.<br /> <br /> In the alternative path, tap_get_user() already prohibits short frame which<br /> has the length less than Ethernet header size from being transmitted.<br /> <br /> This is to drop any frame shorter than the Ethernet header size just like<br /> how tap_get_user() does.<br /> <br /> CVE: CVE-2024-41090

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.281 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.223 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.164 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.102 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.43 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.9.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.10 (including) 6.10.2 (excluding)