{"id":"CVE-2024-49948","summary":"net: add more sanity checks to qdisc_pkt_len_init()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: add more sanity checks to qdisc_pkt_len_init()\n\nOne path takes care of SKB_GSO_DODGY, assuming\nskb-\u003elen is bigger than hdr_len.\n\nvirtio_net_hdr_to_skb() does not fully dissect TCP headers,\nit only make sure it is at least 20 bytes.\n\nIt is possible for an user to provide a malicious 'GSO' packet,\ntotal length of 80 bytes.\n\n- 20 bytes of IPv4 header\n- 60 bytes TCP header\n- a small gso_size like 8\n\nvirtio_net_hdr_to_skb() would declare this packet as a normal\nGSO packet, because it would see 40 bytes of payload,\nbigger than gso_size.\n\nWe need to make detect this case to not underflow\nqdisc_skb_cb(skb)-\u003epkt_len.","modified":"2026-04-02T12:21:09.991357Z","published":"2024-10-21T18:02:05.121Z","related":["MGASA-2024-0344","MGASA-2024-0345","SUSE-SU-2025:0428-1","SUSE-SU-2025:0499-1","SUSE-SU-2025:0557-1","SUSE-SU-2025:0564-1","SUSE-SU-2025:0565-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49948.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1eebe602a8d8264a12e35e39d0645fa88dbbacdd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2415f465730e48b6e38da1c7c097317bf5dd2d20"},{"type":"WEB","url":"https://git.kernel.org/stable/c/27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/473426a1d53a68dd1e718e6cd00d57936993fa6c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/566a931a1436d0e0ad13708ea55479b95426213c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9b0ee571d20a238a22722126abdfde61f1b2bdd0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ab9a9a9e9647392a19e7a885b08000e89c86b535"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d7d1a28f5dd57b4d83def876f8d7b4403bd37df9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49948.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-49948"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1def9238d4aa2146924994aa4b7dc861f03b9362"},{"fixed":"d7d1a28f5dd57b4d83def876f8d7b4403bd37df9"},{"fixed":"473426a1d53a68dd1e718e6cd00d57936993fa6c"},{"fixed":"566a931a1436d0e0ad13708ea55479b95426213c"},{"fixed":"2415f465730e48b6e38da1c7c097317bf5dd2d20"},{"fixed":"27a8fabc54d2f960d47bdfbebf2bdc6e8a92a4c4"},{"fixed":"9b0ee571d20a238a22722126abdfde61f1b2bdd0"},{"fixed":"ff1c3cadcf405ab37dd91418a62a7acecf3bc5e2"},{"fixed":"1eebe602a8d8264a12e35e39d0645fa88dbbacdd"},{"fixed":"ab9a9a9e9647392a19e7a885b08000e89c86b535"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-49948.json"}}],"schema_version":"1.7.5"}