First published: Sat Nov 09 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: fix crash when config small gso_max_size/gso_ipv4_max_size Config a small gso_max_size/gso_ipv4_max_size will lead to an underflow in sk_dst_gso_max_size(), which may trigger a BUG_ON crash, because sk->sk_gso_max_size would be much bigger than device limits. Call Trace: tcp_write_xmit tso_segs = tcp_init_tso_segs(skb, mss_now); tcp_set_skb_tso_segs tcp_skb_pcount_set // skb->len = 524288, mss_now = 8 // u16 tso_segs = 524288/8 = 65535 -> 0 tso_segs = DIV_ROUND_UP(skb->len, mss_now) BUG_ON(!tso_segs) Add check for the minimum value of gso_max_size and gso_ipv4_max_size.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.16<=6.6.60 | |
Linux Kernel | >=6.7<=6.11.7 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50258 is considered a moderate severity vulnerability in the Linux kernel.
To fix CVE-2024-50258, upgrade your Linux kernel to a version that includes the patch, such as versions 6.1.123-1, 6.1.128-1, 6.12.12-1, or 6.12.15-1.
CVE-2024-50258 affects Linux kernel versions between 4.16 and 6.6.60, as well as certain release candidates up to 6.12-rc5.
Exploitation of CVE-2024-50258 can lead to an underflow that may trigger a BUG_ON crash in the Linux kernel.
Yes, CVE-2024-50258 has been resolved in releases beyond version 6.12, ensuring that the vulnerability no longer exists.