{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-41066","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-07-12T12:17:45.630Z","datePublished":"2024-07-29T14:57:27.832Z","dateUpdated":"2026-01-05T10:37:32.438Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-01-05T10:37:32.438Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nibmvnic: Add tx check to prevent skb leak\n\nBelow is a summary of how the driver stores a reference to an skb during\ntransmit:\n    tx_buff[free_map[consumer_index]]->skb = new_skb;\n    free_map[consumer_index] = IBMVNIC_INVALID_MAP;\n    consumer_index ++;\nWhere variable data looks like this:\n    free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3]\n                                               \tconsumer_index^\n    tx_buff == [skb=null, skb=<ptr>, skb=<ptr>, skb=null, skb=null]\n\nThe driver has checks to ensure that free_map[consumer_index] pointed to\na valid index but there was no check to ensure that this index pointed\nto an unused/null skb address. So, if, by some chance, our free_map and\ntx_buff lists become out of sync then we were previously risking an\nskb memory leak. This could then cause tcp congestion control to stop\nsending packets, eventually leading to ETIMEDOUT.\n\nTherefore, add a conditional to ensure that the skb address is null. If\nnot then warn the user (because this is still a bug that should be\npatched) and free the old pointer to prevent memleak/tcp problems."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/ibm/ibmvnic.c"],"versions":[{"version":"65d6470d139a6c1655fccb5cbacbeaba8e8ad2f8","lessThan":"16ad1557cae582e79bb82dddd612d9bdfaa11d4c","status":"affected","versionType":"git"},{"version":"65d6470d139a6c1655fccb5cbacbeaba8e8ad2f8","lessThan":"267c61c4afed0ff9a2e83462abad3f41d8ca1f06","status":"affected","versionType":"git"},{"version":"65d6470d139a6c1655fccb5cbacbeaba8e8ad2f8","lessThan":"e7b75def33eae61ddaad6cb616c517dc3882eb2a","status":"affected","versionType":"git"},{"version":"65d6470d139a6c1655fccb5cbacbeaba8e8ad2f8","lessThan":"0983d288caf984de0202c66641577b739caad561","status":"affected","versionType":"git"},{"version":"1a64564eee05128f773930649edfdd50cbe80656","status":"affected","versionType":"git"},{"version":"5142c39253385702a4de8f897027e1d76fc333de","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/ibm/ibmvnic.c"],"versions":[{"version":"5.14","status":"affected"},{"version":"0","lessThan":"5.14","status":"unaffected","versionType":"semver"},{"version":"6.1.101","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.42","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.9.11","lessThanOrEqual":"6.9.*","status":"unaffected","versionType":"semver"},{"version":"6.10","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.1.101"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.6.42"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.9.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/16ad1557cae582e79bb82dddd612d9bdfaa11d4c"},{"url":"https://git.kernel.org/stable/c/267c61c4afed0ff9a2e83462abad3f41d8ca1f06"},{"url":"https://git.kernel.org/stable/c/e7b75def33eae61ddaad6cb616c517dc3882eb2a"},{"url":"https://git.kernel.org/stable/c/0983d288caf984de0202c66641577b739caad561"}],"title":"ibmvnic: Add tx check to prevent skb leak","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/16ad1557cae582e79bb82dddd612d9bdfaa11d4c","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/267c61c4afed0ff9a2e83462abad3f41d8ca1f06","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e7b75def33eae61ddaad6cb616c517dc3882eb2a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/0983d288caf984de0202c66641577b739caad561","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:00:16.258Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-41066","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T16:21:52.759335Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:32:57.523Z"}}]}}