In the Linux kernel, the following vulnerability has been resolved:
l2tp: pass correct message length to ip6_append_data
l2tp_ip6_sendmsg needs to avoid accounting for the transport header
twice when splicing more data into an already partially-occupied skbuff.
To manage this, we check whether the skbuff contains data using
skb_queue_empty when deciding how much data to append using
ip6_append_data.
However, the code which performed the calculation was incorrect:
ulen = len + skb_queue_empty(&sk->sk_write_queue) ? transhdrlen : 0;
...due to C operator precedence, this ends up setting ulen to
transhdrlen for messages with a non-zero length, which results in
corrupted packets on the wire.
Add parentheses to correct the calculation in line with the original
intent.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Mar 2025, 16:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.14.327:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5.7:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Debian debian Linux
Linux linux Kernel Debian Linux |
|
CWE | CWE-131 | |
References | () https://git.kernel.org/stable/c/0da15a70395182ee8cb75716baf00dddc0bea38d - Patch | |
References | () https://git.kernel.org/stable/c/13cd1daeea848614e585b2c6ecc11ca9c8ab2500 - Patch | |
References | () https://git.kernel.org/stable/c/359e54a93ab43d32ee1bff3c2f9f10cb9f6b6e79 - Patch | |
References | () https://git.kernel.org/stable/c/4c3ce64bc9d36ca9164dd6c77ff144c121011aae - Patch | |
References | () https://git.kernel.org/stable/c/804bd8650a3a2bf3432375f8c97d5049d845ce56 - Patch | |
References | () https://git.kernel.org/stable/c/83340c66b498e49353530e41542500fc8a4782d6 - Patch | |
References | () https://git.kernel.org/stable/c/c1d3a84a67db910ce28a871273c992c3d7f9efb5 - Patch | |
References | () https://git.kernel.org/stable/c/dcb4d14268595065c85dc5528056713928e17243 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List |
Information
Published : 2024-04-03 17:15
Updated : 2025-03-17 16:57
NVD link : CVE-2024-26752
Mitre link : CVE-2024-26752
CVE.ORG link : CVE-2024-26752
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-131
Incorrect Calculation of Buffer Size