First published: Fri Jul 29 2011(Updated: )
Currently skb_gro_header_slow unconditionally resets frag0 and frag0_len. However, when we can't pull on the skb this leaves the GRO fields in an inconsistent state. This patch fixes this by only resetting those fields after the pskb_may_pull test. Upstream commit: <a href="http://git.kernel.org/linus/17dd759c67f21e34f2156abcf415e1f60605a188">http://git.kernel.org/linus/17dd759c67f21e34f2156abcf415e1f60605a188</a> Acknowledgements: Red Hat would like to thank Brent Meshier for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <2.6.39.4 | |
Linux Kernel | <2.6.39.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2723 has a medium severity rating due to the potential for inconsistent fragmented packet handling.
To mitigate CVE-2011-2723, update your Linux kernel to version 2.6.39.4 or later.
CVE-2011-2723 affects Linux kernel versions prior to 2.6.39.4.
The impact of CVE-2011-2723 includes possible packet loss and inconsistent state in packet fragmentation.
Yes, CVE-2011-2723 can negatively affect network performance due to issues with fragmented packets.