Skip to main content

CVE-2024-49948: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-49948cvecve-2024-49948
Published: Mon Oct 21 2024 (10/21/2024, 18:02:05 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init() One path takes care of SKB_GSO_DODGY, assuming skb->len is bigger than hdr_len. virtio_net_hdr_to_skb() does not fully dissect TCP headers, it only make sure it is at least 20 bytes. It is possible for an user to provide a malicious 'GSO' packet, total length of 80 bytes. - 20 bytes of IPv4 header - 60 bytes TCP header - a small gso_size like 8 virtio_net_hdr_to_skb() would declare this packet as a normal GSO packet, because it would see 40 bytes of payload, bigger than gso_size. We need to make detect this case to not underflow qdisc_skb_cb(skb)->pkt_len.

AI-Powered Analysis

AILast updated: 06/28/2025, 15:26:44 UTC

Technical Analysis

CVE-2024-49948 is a vulnerability identified in the Linux kernel's network subsystem, specifically related to the handling of Generic Segmentation Offload (GSO) packets within the virtio network driver. The issue arises in the function virtio_net_hdr_to_skb(), which is responsible for converting virtio network headers into socket buffers (skbs). This function does not fully dissect TCP headers and only verifies that the TCP header is at least 20 bytes long. An attacker can craft a malicious GSO packet with a total length of 80 bytes composed of a 20-byte IPv4 header, a 60-byte TCP header, and a small gso_size value such as 8. Due to insufficient validation, virtio_net_hdr_to_skb() incorrectly treats this packet as a normal GSO packet because it sees 40 bytes of payload, which is larger than the gso_size. This misclassification leads to an underflow condition in qdisc_skb_cb(skb)->pkt_len, a field used by the queuing discipline (qdisc) subsystem to track packet lengths. The vulnerability stems from a lack of sanity checks in qdisc_pkt_len_init(), which fails to detect this anomalous packet structure. Exploiting this flaw could allow a local or remote attacker to cause memory corruption or kernel instability by sending specially crafted packets, potentially leading to denial of service or privilege escalation. The vulnerability affects Linux kernel versions prior to the patch that adds these additional sanity checks. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying heavily on Linux-based infrastructure, including servers, network appliances, and virtualized environments using virtio drivers. The flaw could be exploited to disrupt network services by causing kernel crashes or memory corruption, leading to denial of service conditions. In environments where Linux kernels are used in critical infrastructure, cloud services, or telecommunications, such disruptions could have cascading effects on business continuity and service availability. Additionally, if exploited for privilege escalation, attackers could gain unauthorized access to sensitive systems, compromising confidentiality and integrity. Given the widespread use of Linux in Europe across public and private sectors, the vulnerability could impact a broad range of organizations, from small enterprises to large data centers and government agencies.

Mitigation Recommendations

Organizations should prioritize updating their Linux kernels to versions that include the patch addressing CVE-2024-49948. Since the vulnerability involves packet processing in the virtio network driver, systems using virtualization platforms that rely on virtio (such as KVM/QEMU) should be specifically targeted for updates. Network administrators should monitor network traffic for unusual GSO packet patterns and consider implementing network-level filtering to detect and block malformed packets that could exploit this vulnerability. Additionally, enabling kernel hardening features such as Kernel Address Space Layout Randomization (KASLR) and Control Flow Integrity (CFI) can reduce exploitation risk. For environments where immediate patching is not feasible, isolating vulnerable systems from untrusted networks and restricting access to trusted users can mitigate exposure. Finally, organizations should maintain up-to-date intrusion detection systems with signatures tuned to detect anomalous network packets related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.045Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfb02

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 3:26:44 PM

Last updated: 8/11/2025, 6:56:26 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats