{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-41090","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-07-12T12:17:45.635Z","datePublished":"2024-07-29T06:18:10.896Z","dateUpdated":"2025-11-03T22:00:46.396Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:21:51.819Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ntap: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tap_get_user_xdp() path, which could cause a corrupted skb to be\nsent downstack. Even before the skb is transmitted, the\ntap_get_user_xdp()-->skb_set_network_header() may assume the size is more\nthan ETH_HLEN. Once transmitted, this could either cause out-of-bound\naccess beyond the actual length, or confuse the underlayer with incorrect\nor inconsistent header length in the skb metadata.\n\nIn the alternative path, tap_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tap_get_user() does.\n\nCVE: CVE-2024-41090"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/tap.c"],"versions":[{"version":"0efac27791ee068075d80f07c55a229b1335ce12","lessThan":"8be915fc5ff9a5e296f6538be12ea75a1a93bdea","status":"affected","versionType":"git"},{"version":"0efac27791ee068075d80f07c55a229b1335ce12","lessThan":"7431144b406ae82807eb87d8c98e518475b0450f","status":"affected","versionType":"git"},{"version":"0efac27791ee068075d80f07c55a229b1335ce12","lessThan":"e5e5e63c506b93b89b01f522b6a7343585f784e6","status":"affected","versionType":"git"},{"version":"0efac27791ee068075d80f07c55a229b1335ce12","lessThan":"ee93e6da30377cf2a75e16cd32bb9fcd86a61c46","status":"affected","versionType":"git"},{"version":"0efac27791ee068075d80f07c55a229b1335ce12","lessThan":"aa6a5704cab861c9b2ae9f475076e1881e87f5aa","status":"affected","versionType":"git"},{"version":"0efac27791ee068075d80f07c55a229b1335ce12","lessThan":"73d462a38d5f782b7c872fe9ae8393d9ef5483da","status":"affected","versionType":"git"},{"version":"0efac27791ee068075d80f07c55a229b1335ce12","lessThan":"e1a786b9bbb767fd1c922d424aaa8078cc542309","status":"affected","versionType":"git"},{"version":"0efac27791ee068075d80f07c55a229b1335ce12","lessThan":"ed7f2afdd0e043a397677e597ced0830b83ba0b3","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/tap.c"],"versions":[{"version":"4.20","status":"affected"},{"version":"0","lessThan":"4.20","status":"unaffected","versionType":"semver"},{"version":"5.4.281","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.223","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.164","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.102","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.43","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.9.12","lessThanOrEqual":"6.9.*","status":"unaffected","versionType":"semver"},{"version":"6.10.2","lessThanOrEqual":"6.10.*","status":"unaffected","versionType":"semver"},{"version":"6.11","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.281"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.10.223"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.15.164"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"6.1.102"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"6.6.43"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"6.9.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"6.10.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"6.11"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/8be915fc5ff9a5e296f6538be12ea75a1a93bdea"},{"url":"https://git.kernel.org/stable/c/7431144b406ae82807eb87d8c98e518475b0450f"},{"url":"https://git.kernel.org/stable/c/e5e5e63c506b93b89b01f522b6a7343585f784e6"},{"url":"https://git.kernel.org/stable/c/ee93e6da30377cf2a75e16cd32bb9fcd86a61c46"},{"url":"https://git.kernel.org/stable/c/aa6a5704cab861c9b2ae9f475076e1881e87f5aa"},{"url":"https://git.kernel.org/stable/c/73d462a38d5f782b7c872fe9ae8393d9ef5483da"},{"url":"https://git.kernel.org/stable/c/e1a786b9bbb767fd1c922d424aaa8078cc542309"},{"url":"https://git.kernel.org/stable/c/ed7f2afdd0e043a397677e597ced0830b83ba0b3"}],"title":"tap: add missing verification for short frame","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/8be915fc5ff9a5e296f6538be12ea75a1a93bdea","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/7431144b406ae82807eb87d8c98e518475b0450f","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e5e5e63c506b93b89b01f522b6a7343585f784e6","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ee93e6da30377cf2a75e16cd32bb9fcd86a61c46","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/aa6a5704cab861c9b2ae9f475076e1881e87f5aa","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/73d462a38d5f782b7c872fe9ae8393d9ef5483da","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e1a786b9bbb767fd1c922d424aaa8078cc542309","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ed7f2afdd0e043a397677e597ced0830b83ba0b3","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:00:46.396Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-41090","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T16:24:59.280166Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:34:06.307Z"}}]}}