We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | Linux |
Reserved | 2024-05-30 |
Published | 2024-05-30 |
Updated | 2024-09-05 |
In the Linux kernel, the following vulnerability has been resolved: net: core: reject skb_copy(_expand) for fraglist GSO skbs SKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become invalid. Return NULL if such an skb is passed to skb_copy or skb_copy_expand, in order to prevent a crash on a potential later call to skb_gso_segment.
https://git.kernel.org/stable/c/faa83a7797f06cefed86731ba4baa3b4dfdc06c1
https://git.kernel.org/stable/c/c7af99cc21923a9650533c9d77265c8dd683a533
https://git.kernel.org/stable/c/989bf6fd1e1d058e73a364dce1a0c53d33373f62
https://git.kernel.org/stable/c/cfe34d86ef9765c388f145039006bb79b6c81ac6
https://git.kernel.org/stable/c/aea5e2669c2863fdd8679c40ee310b3bcaa85aec
https://git.kernel.org/stable/c/d091e579b864fa790dd6a0cd537a22c383126681
https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html