
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-44940 addresses a vulnerability in the Linux kernel's FOU (Foo-over-UDP) protocol implementation. The issue was discovered in the guegroreceive function where a warning message was triggered for unsupported protocols. The vulnerability affects Linux kernel versions up to 6.6.47 and versions from 6.7 up to 6.10.6 (NVD).
The vulnerability exists in the Linux kernel's FOU implementation where the guegroreceive function would trigger a WARNONONCE message when encountering packets with unsupported protocols or missing GRO handlers. This warning was previously reduced from WARNON to WARNON_ONCE in an earlier commit. The issue has a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability could potentially lead to system information disclosure through warning messages when processing certain network packets. While the warning messages themselves were not actionable and expected behavior, they could potentially be used to gather information about the system's network stack implementation (Kernel Patch).
The vulnerability has been patched by removing the WARNONONCE check in the guegroreceive function, as these warnings were determined to be expected behavior and not actionable. The fix has been implemented in various Linux distributions including Ubuntu and Debian through security updates (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."