[SRU][N/J/F][PATCH 0/1] CVE-2024-44940

Bethany Jamison bethany.jamison at canonical.com
Wed Sep 25 17:14:23 UTC 2024


[Impact]

Drop the WARN_ON_ONCE inn gue_gro_receive if the encapsulated type is
not known or does not have a GRO handler.

Such a packet is easily constructed. Syzbot generates them and sets
off this warning.

Remove the warning as it is expected and not actionable.

[Fix]

Noble:	Clean cherry-pick from linux-6.10.y
Jammy:	Backport - use 'goto out_unlock' instead of 'goto out' to
	adjust for not including commit fc1ca3348a74a1af (gro: remove 
	rcu_read_lock/rcu_read_unlock from gro_receive handlers)
Focal:	Jammy patch applied cleanly
Bionic:	fix sent to esm ML
Xenial:	fix sent to esm ML
Trusty:	not-affected

[Test Case]

Compile and boot tested.

[Where problems could occur]

This fix affects those who use FOU (Foo-over-UDP), an issue with this
fix would be visible to the user via continued excessive warnings from
'gue_gro_recieve'.

Willem de Bruijn (1):
  fou: remove warn in gue_gro_receive on unsupported protocol

 net/ipv4/fou_core.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

-- 
2.34.1




More information about the kernel-team mailing list