Bug 2348074 (CVE-2022-49340) - CVE-2022-49340 kernel: ip_gre: test csum_start instead of transport header
Summary: CVE-2022-49340 kernel: ip_gre: test csum_start instead of transport header
Keywords:
Status: NEW
Alias: CVE-2022-49340
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-26 03:16 UTC by OSIDB Bzimport
Modified: 2025-02-27 19:33 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-02-26 03:16:43 UTC
In the Linux kernel, the following vulnerability has been resolved:

ip_gre: test csum_start instead of transport header

GRE with TUNNEL_CSUM will apply local checksum offload on
CHECKSUM_PARTIAL packets.

ipgre_xmit must validate csum_start after an optional skb_pull,
else lco_csum may trigger an overflow. The original check was

	if (csum && skb_checksum_start(skb) < skb->data)
		return -EINVAL;

This had false positives when skb_checksum_start is undefined:
when ip_summed is not CHECKSUM_PARTIAL. A discussed refinement
was straightforward

	if (csum && skb->ip_summed == CHECKSUM_PARTIAL &&
	    skb_checksum_start(skb) < skb->data)
		return -EINVAL;

But was eventually revised more thoroughly:
- restrict the check to the only branch where needed, in an
  uncommon GRE path that uses header_ops and calls skb_pull.
- test skb_transport_header, which is set along with csum_start
  in skb_partial_csum_set in the normal header_ops datapath.

Turns out skbs can arrive in this branch without the transport
header set, e.g., through BPF redirection.

Revise the check back to check csum_start directly, and only if
CHECKSUM_PARTIAL. Do leave the check in the updated location.
Check field regardless of whether TUNNEL_CSUM is configured.

Comment 1 Avinash Hanwate 2025-02-26 11:05:14 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2022-49340-419b@gregkh/T

Comment 4 Avinash Hanwate 2025-02-27 19:22:53 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022640-CVE-2022-49340-419b@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.