CVE-2024-45030
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
11/09/2024
Last modified:
13/09/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
igb: cope with large MAX_SKB_FRAGS<br />
<br />
Sabrina reports that the igb driver does not cope well with large<br />
MAX_SKB_FRAG values: setting MAX_SKB_FRAG to 45 causes payload<br />
corruption on TX.<br />
<br />
An easy reproducer is to run ssh to connect to the machine. With<br />
MAX_SKB_FRAGS=17 it works, with MAX_SKB_FRAGS=45 it fails. This has<br />
been reported originally in<br />
https://bugzilla.redhat.com/show_bug.cgi?id=2265320<br />
<br />
The root cause of the issue is that the driver does not take into<br />
account properly the (possibly large) shared info size when selecting<br />
the ring layout, and will try to fit two packets inside the same 4K<br />
page even when the 1st fraglist will trump over the 2nd head.<br />
<br />
Address the issue by checking if 2K buffers are insufficient.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.4 (including) | 6.6.48 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



