CVE-2024-45030

Source
https://cve.org/CVERecord?id=CVE-2024-45030
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-45030.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-45030
Downstream
Related
Published
2024-09-11T15:14:00.886Z
Modified
2026-05-15T11:54:40.021266186Z
Summary
igb: cope with large MAX_SKB_FRAGS
Details

In the Linux kernel, the following vulnerability has been resolved:

igb: cope with large MAXSKBFRAGS

Sabrina reports that the igb driver does not cope well with large MAXSKBFRAG values: setting MAXSKBFRAG to 45 causes payload corruption on TX.

An easy reproducer is to run ssh to connect to the machine. With MAXSKBFRAGS=17 it works, with MAXSKBFRAGS=45 it fails. This has been reported originally in https://bugzilla.redhat.com/show_bug.cgi?id=2265320

The root cause of the issue is that the driver does not take into account properly the (possibly large) shared info size when selecting the ring layout, and will try to fit two packets inside the same 4K page even when the 1st fraglist will trump over the 2nd head.

Address the issue by checking if 2K buffers are insufficient.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/45xxx/CVE-2024-45030.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.4.0
Fixed
6.6.48
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.10.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-45030.json"