ghsa-qw45-gv2r-frwm
Vulnerability from github
Published
2024-05-01 15:30
Modified
2024-05-01 15:30
Details

In the Linux kernel, the following vulnerability has been resolved:

vmxnet3: Fix missing reserved tailroom

Use rbi->len instead of rcd->len for non-dataring packet.

Found issue: XDP_WARN: xdp_update_frame_from_buff(line:278): Driver BUG: missing reserved tailroom WARNING: CPU: 0 PID: 0 at net/core/xdp.c:586 xdp_warn+0xf/0x20 CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W O 6.5.1 #1 RIP: 0010:xdp_warn+0xf/0x20 ... ? xdp_warn+0xf/0x20 xdp_do_redirect+0x15f/0x1c0 vmxnet3_run_xdp+0x17a/0x400 [vmxnet3] vmxnet3_process_xdp+0xe4/0x760 [vmxnet3] ? vmxnet3_tq_tx_complete.isra.0+0x21e/0x2c0 [vmxnet3] vmxnet3_rq_rx_complete+0x7ad/0x1120 [vmxnet3] vmxnet3_poll_rx_only+0x2d/0xa0 [vmxnet3] __napi_poll+0x20/0x180 net_rx_action+0x177/0x390

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2024-27026"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-05-01T13:15:48Z",
    "severity": null
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nvmxnet3: Fix missing reserved tailroom\n\nUse rbi-\u003elen instead of rcd-\u003elen for non-dataring packet.\n\nFound issue:\n  XDP_WARN: xdp_update_frame_from_buff(line:278): Driver BUG: missing reserved tailroom\n  WARNING: CPU: 0 PID: 0 at net/core/xdp.c:586 xdp_warn+0xf/0x20\n  CPU: 0 PID: 0 Comm: swapper/0 Tainted: G        W  O       6.5.1 #1\n  RIP: 0010:xdp_warn+0xf/0x20\n  ...\n  ? xdp_warn+0xf/0x20\n  xdp_do_redirect+0x15f/0x1c0\n  vmxnet3_run_xdp+0x17a/0x400 [vmxnet3]\n  vmxnet3_process_xdp+0xe4/0x760 [vmxnet3]\n  ? vmxnet3_tq_tx_complete.isra.0+0x21e/0x2c0 [vmxnet3]\n  vmxnet3_rq_rx_complete+0x7ad/0x1120 [vmxnet3]\n  vmxnet3_poll_rx_only+0x2d/0xa0 [vmxnet3]\n  __napi_poll+0x20/0x180\n  net_rx_action+0x177/0x390",
  "id": "GHSA-qw45-gv2r-frwm",
  "modified": "2024-05-01T15:30:34Z",
  "published": "2024-05-01T15:30:34Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27026"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/7c8505ecc2d15473d679b8e06335434b84fffe86"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/91d017d19d5a9ad153e2dc23ed3c0e2e79ef5262"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/aba8659caf88017507419feea06069f529329ea6"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/e127ce7699c1e05279ee5ee61f00893e7bfa9671"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.