[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <hisntim4en6bh5ewqeaamirsq4f3ajax7f27dszntlqz3d3mz4@vkkkdvspxsu6>
Date: Fri, 30 Aug 2024 13:06:01 +0200
From: Michal Koutný <mkoutny@...e.com>
To: Willem de Bruijn <willemb@...gle.com>
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>, cve@...nel.org,
linux-kernel@...r.kernel.org, Tao Liu <thomas.liu@...oud.cn>
Subject: Re: CVE-2022-48936: gso: do not skip outer ip header in case of ipip
and net_failover
On Thu, Aug 29, 2024 at 01:07:36PM GMT, Willem de Bruijn <willemb@...gle.com> wrote:
> With the fix backported to all these branches, not sure what, if
> anything, more is needed wrt the CVE.
My goal is to maintain some positive signal/noise in the assigned CVEs.
(Also, there are other kernel branches to evaluate as Greg says :-))
On Thu, Aug 29, 2024 at 12:53:34PM GMT, Willem de Bruijn <willemb@...gle.com> wrote:
> The patch reports that the negative effect is a drop due to a corrupted packet.
>
> According to the CVE report this requires both user input with
> virtio_net_hdr, which is privileged, and a tunnel device configured,
> which again is privileged.
(Unless inside netns, I assume. Though...)
...that affects only scope of the same user, right? (The effect doesn't
cross boundary of any security domains.)
So far there is nothing in my (incomplete) understadning that would
classify this as a vulnerability (bugfix it is indeed).
Thanks,
Michal
Powered by blists - more mailing lists