CVE-2024-49979: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: gso: fix tcp fraglist segmentation after pull from frag_list Detect tcp gso fraglist skbs with corrupted geometry (see below) and pass these to skb_segment instead of skb_segment_list, as the first can segment them correctly. Valid SKB_GSO_FRAGLIST skbs - consist of two or more segments - the head_skb holds the protocol headers plus first gso_size - one or more frag_list skbs hold exactly one segment - all but the last must be gso_size Optional datapath hooks such as NAT and BPF (bpf_skb_pull_data) can modify these skbs, breaking these invariants. In extreme cases they pull all data into skb linear. For TCP, this causes a NULL ptr deref in __tcpv4_gso_segment_list_csum at tcp_hdr(seg->next). Detect invalid geometry due to pull, by checking head_skb size. Don't just drop, as this may blackhole a destination. Convert to be able to pass to regular skb_segment. Approach and description based on a patch by Willem de Bruijn.
AI Analysis
Technical Summary
CVE-2024-49979 is a vulnerability identified in the Linux kernel's network stack, specifically within the Generic Segmentation Offload (GSO) handling of TCP fragmented socket buffers (skbs). The vulnerability arises due to improper handling of TCP fraglist skbs that have corrupted geometry after being modified by optional datapath hooks such as NAT or BPF programs (e.g., bpf_skb_pull_data). Normally, a valid SKB_GSO_FRAGLIST skb consists of multiple segments where the head skb contains protocol headers and the first gso_size segment, and subsequent frag_list skbs each hold exactly one segment. These invariants can be broken when datapath hooks pull data into the skb linear area, causing the skb geometry to become invalid. This leads to a NULL pointer dereference in the function __tcpv4_gso_segment_list_csum when accessing tcp_hdr(seg->next), resulting in a kernel crash or denial of service. The patch addresses this by detecting corrupted skb geometry through head_skb size checks and rerouting such skbs to skb_segment instead of skb_segment_list, which can safely segment them despite the corruption. This fix prevents kernel crashes caused by malformed TCP fraglist skbs without dropping packets and potentially blackholing destinations. The vulnerability is technical and subtle, involving low-level kernel networking internals and skb segmentation logic. It was discovered and patched based on a contribution by Willem de Bruijn. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions that handle TCP traffic with GSO enabled, which is common in modern Linux distributions used in servers, network appliances, and cloud infrastructure. Exploitation can cause kernel crashes leading to denial of service (DoS), disrupting critical network services, web hosting, cloud platforms, and enterprise applications. This can impact availability and operational continuity, especially for organizations relying on Linux-based infrastructure for internet-facing services or internal networking. While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the induced DoS can be leveraged by attackers to degrade service or cause outages during targeted attacks. European sectors such as finance, telecommunications, government, and critical infrastructure, which heavily depend on Linux servers and network devices, could face service disruptions. The lack of known exploits reduces immediate risk, but the technical nature of the flaw means sophisticated attackers or automated scanning tools could potentially trigger the issue. Additionally, the involvement of datapath hooks like BPF and NAT means complex network setups or containerized environments using advanced packet processing are more exposed.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address CVE-2024-49979 as soon as they become available from trusted Linux distribution vendors or the mainline kernel. 2. For environments using custom or older kernels, backport the patch or upgrade to a kernel version that includes the fix. 3. Monitor network datapath hooks such as BPF programs and NAT configurations that manipulate skb data, as these increase exposure to the vulnerability. Review and limit the use of complex skb modifications where possible. 4. Implement robust kernel crash monitoring and automated recovery mechanisms to minimize downtime if exploitation occurs. 5. In containerized or virtualized environments, ensure host kernels are patched promptly, as container networking often relies on these kernel features. 6. Use network segmentation and firewall rules to limit exposure of vulnerable systems to untrusted networks. 7. Stay informed through Linux kernel mailing lists and security advisories for any emerging exploit reports or additional mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-49979: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: gso: fix tcp fraglist segmentation after pull from frag_list Detect tcp gso fraglist skbs with corrupted geometry (see below) and pass these to skb_segment instead of skb_segment_list, as the first can segment them correctly. Valid SKB_GSO_FRAGLIST skbs - consist of two or more segments - the head_skb holds the protocol headers plus first gso_size - one or more frag_list skbs hold exactly one segment - all but the last must be gso_size Optional datapath hooks such as NAT and BPF (bpf_skb_pull_data) can modify these skbs, breaking these invariants. In extreme cases they pull all data into skb linear. For TCP, this causes a NULL ptr deref in __tcpv4_gso_segment_list_csum at tcp_hdr(seg->next). Detect invalid geometry due to pull, by checking head_skb size. Don't just drop, as this may blackhole a destination. Convert to be able to pass to regular skb_segment. Approach and description based on a patch by Willem de Bruijn.
AI-Powered Analysis
Technical Analysis
CVE-2024-49979 is a vulnerability identified in the Linux kernel's network stack, specifically within the Generic Segmentation Offload (GSO) handling of TCP fragmented socket buffers (skbs). The vulnerability arises due to improper handling of TCP fraglist skbs that have corrupted geometry after being modified by optional datapath hooks such as NAT or BPF programs (e.g., bpf_skb_pull_data). Normally, a valid SKB_GSO_FRAGLIST skb consists of multiple segments where the head skb contains protocol headers and the first gso_size segment, and subsequent frag_list skbs each hold exactly one segment. These invariants can be broken when datapath hooks pull data into the skb linear area, causing the skb geometry to become invalid. This leads to a NULL pointer dereference in the function __tcpv4_gso_segment_list_csum when accessing tcp_hdr(seg->next), resulting in a kernel crash or denial of service. The patch addresses this by detecting corrupted skb geometry through head_skb size checks and rerouting such skbs to skb_segment instead of skb_segment_list, which can safely segment them despite the corruption. This fix prevents kernel crashes caused by malformed TCP fraglist skbs without dropping packets and potentially blackholing destinations. The vulnerability is technical and subtle, involving low-level kernel networking internals and skb segmentation logic. It was discovered and patched based on a contribution by Willem de Bruijn. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions that handle TCP traffic with GSO enabled, which is common in modern Linux distributions used in servers, network appliances, and cloud infrastructure. Exploitation can cause kernel crashes leading to denial of service (DoS), disrupting critical network services, web hosting, cloud platforms, and enterprise applications. This can impact availability and operational continuity, especially for organizations relying on Linux-based infrastructure for internet-facing services or internal networking. While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the induced DoS can be leveraged by attackers to degrade service or cause outages during targeted attacks. European sectors such as finance, telecommunications, government, and critical infrastructure, which heavily depend on Linux servers and network devices, could face service disruptions. The lack of known exploits reduces immediate risk, but the technical nature of the flaw means sophisticated attackers or automated scanning tools could potentially trigger the issue. Additionally, the involvement of datapath hooks like BPF and NAT means complex network setups or containerized environments using advanced packet processing are more exposed.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address CVE-2024-49979 as soon as they become available from trusted Linux distribution vendors or the mainline kernel. 2. For environments using custom or older kernels, backport the patch or upgrade to a kernel version that includes the fix. 3. Monitor network datapath hooks such as BPF programs and NAT configurations that manipulate skb data, as these increase exposure to the vulnerability. Review and limit the use of complex skb modifications where possible. 4. Implement robust kernel crash monitoring and automated recovery mechanisms to minimize downtime if exploitation occurs. 5. In containerized or virtualized environments, ensure host kernels are patched promptly, as container networking often relies on these kernel features. 6. Use network segmentation and firewall rules to limit exposure of vulnerable systems to untrusted networks. 7. Stay informed through Linux kernel mailing lists and security advisories for any emerging exploit reports or additional mitigations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T12:17:06.052Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfbe0
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 3:43:03 PM
Last updated: 7/28/2025, 11:56:54 PM
Views: 10
Related Threats
CVE-2025-8964: Improper Authentication in code-projects Hostel Management System
MediumCVE-2025-7971: CWE-20: Improper Input Validation in Rockwell Automation Studio 5000 Logix Designer®
HighCVE-2025-40758: CWE-347: Improper Verification of Cryptographic Signature in Siemens Mendix SAML (Mendix 10.12 compatible)
HighCVE-2025-36613: CWE-266: Incorrect Privilege Assignment in Dell SupportAssist for Home PCs
LowCVE-2025-27845: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.