{"api_version":"1","generated_at":"2026-04-22T16:04:03+00:00","cve":"CVE-2024-44940","urls":{"html":"https://cve.report/CVE-2024-44940","api":"https://cve.report/api/cve/CVE-2024-44940.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-44940","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-44940"},"summary":{"title":"fou: remove warn in gue_gro_receive on unsupported protocol","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nfou: remove warn in gue_gro_receive on unsupported protocol\n\nDrop the WARN_ON_ONCE inn gue_gro_receive if the encapsulated type is\nnot known or does not have a GRO handler.\n\nSuch a packet is easily constructed. Syzbot generates them and sets\noff this warning.\n\nRemove the warning as it is expected and not actionable.\n\nThe warning was previously reduced from WARN_ON to WARN_ON_ONCE in\ncommit 270136613bf7 (\"fou: Do WARN_ON_ONCE in gue_gro_receive for bad\nproto callbacks\").","state":"PUBLISHED","assigner":"Linux","published_at":"2024-08-26 12:15:06","updated_at":"2026-04-01 18:08:20"},"problem_types":["NVD-CWE-noinfo"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"references":[{"url":"https://git.kernel.org/stable/c/a925a200299a6dfc7c172f54da6f374edc930053","name":"https://git.kernel.org/stable/c/a925a200299a6dfc7c172f54da6f374edc930053","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"fou: remove warn in gue_gro_receive on unsupported protocol - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html","name":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[SECURITY] [DLA 4075-1] linux security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/3db4395332e7050ef9ddeb3052e6b5019f2a2a59","name":"https://git.kernel.org/stable/c/3db4395332e7050ef9ddeb3052e6b5019f2a2a59","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"fou: remove warn in gue_gro_receive on unsupported protocol - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/dd89a81d850fa9a65f67b4527c0e420d15bf836c","name":"https://git.kernel.org/stable/c/dd89a81d850fa9a65f67b4527c0e420d15bf836c","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"fou: remove warn in gue_gro_receive on unsupported protocol - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/440ab7f97261bc28501636a13998e1b1946d2e79","name":"https://git.kernel.org/stable/c/440ab7f97261bc28501636a13998e1b1946d2e79","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"fou: remove warn in gue_gro_receive on unsupported protocol - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/b1453a5616c7bd8acd90633ceba4e59105ba3b51","name":"https://git.kernel.org/stable/c/b1453a5616c7bd8acd90633ceba4e59105ba3b51","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"fou: remove warn in gue_gro_receive on unsupported protocol - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/5a2e37bc648a2503bf6d687aed27b9f4455d82eb","name":"https://git.kernel.org/stable/c/5a2e37bc648a2503bf6d687aed27b9f4455d82eb","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Issue Tracking"],"title":"fou: remove warn in gue_gro_receive on unsupported protocol - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","name":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[SECURITY] [DLA 4008-1] linux-6.1 security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-44940","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44940","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 37dd0247797b168ad1cc7f5dbec825a1ee66535b a925a200299a6dfc7c172f54da6f374edc930053 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 37dd0247797b168ad1cc7f5dbec825a1ee66535b b1453a5616c7bd8acd90633ceba4e59105ba3b51 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 37dd0247797b168ad1cc7f5dbec825a1ee66535b 5a2e37bc648a2503bf6d687aed27b9f4455d82eb git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 37dd0247797b168ad1cc7f5dbec825a1ee66535b 3db4395332e7050ef9ddeb3052e6b5019f2a2a59 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 37dd0247797b168ad1cc7f5dbec825a1ee66535b 440ab7f97261bc28501636a13998e1b1946d2e79 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 37dd0247797b168ad1cc7f5dbec825a1ee66535b dd89a81d850fa9a65f67b4527c0e420d15bf836c git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 3.18","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 3.18 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.10.234 5.10.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.174 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.107 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.47 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.10.6 6.10.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.11 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"44940","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2024","cve_id":"44940","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2024-44940","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2024-09-10T15:27:32.251724Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2024-09-12T17:33:06.539Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2025-11-03T22:13:45.636Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["net/ipv4/fou_core.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"a925a200299a6dfc7c172f54da6f374edc930053","status":"affected","version":"37dd0247797b168ad1cc7f5dbec825a1ee66535b","versionType":"git"},{"lessThan":"b1453a5616c7bd8acd90633ceba4e59105ba3b51","status":"affected","version":"37dd0247797b168ad1cc7f5dbec825a1ee66535b","versionType":"git"},{"lessThan":"5a2e37bc648a2503bf6d687aed27b9f4455d82eb","status":"affected","version":"37dd0247797b168ad1cc7f5dbec825a1ee66535b","versionType":"git"},{"lessThan":"3db4395332e7050ef9ddeb3052e6b5019f2a2a59","status":"affected","version":"37dd0247797b168ad1cc7f5dbec825a1ee66535b","versionType":"git"},{"lessThan":"440ab7f97261bc28501636a13998e1b1946d2e79","status":"affected","version":"37dd0247797b168ad1cc7f5dbec825a1ee66535b","versionType":"git"},{"lessThan":"dd89a81d850fa9a65f67b4527c0e420d15bf836c","status":"affected","version":"37dd0247797b168ad1cc7f5dbec825a1ee66535b","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["net/ipv4/fou_core.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"3.18"},{"lessThan":"3.18","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"5.10.*","status":"unaffected","version":"5.10.234","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.174","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.107","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.47","versionType":"semver"},{"lessThanOrEqual":"6.10.*","status":"unaffected","version":"6.10.6","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"6.11","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.10.234","versionStartIncluding":"3.18","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.174","versionStartIncluding":"3.18","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.107","versionStartIncluding":"3.18","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.47","versionStartIncluding":"3.18","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.10.6","versionStartIncluding":"3.18","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.11","versionStartIncluding":"3.18","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nfou: remove warn in gue_gro_receive on unsupported protocol\n\nDrop the WARN_ON_ONCE inn gue_gro_receive if the encapsulated type is\nnot known or does not have a GRO handler.\n\nSuch a packet is easily constructed. Syzbot generates them and sets\noff this warning.\n\nRemove the warning as it is expected and not actionable.\n\nThe warning was previously reduced from WARN_ON to WARN_ON_ONCE in\ncommit 270136613bf7 (\"fou: Do WARN_ON_ONCE in gue_gro_receive for bad\nproto callbacks\")."}],"providerMetadata":{"dateUpdated":"2026-01-05T10:52:37.442Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/a925a200299a6dfc7c172f54da6f374edc930053"},{"url":"https://git.kernel.org/stable/c/b1453a5616c7bd8acd90633ceba4e59105ba3b51"},{"url":"https://git.kernel.org/stable/c/5a2e37bc648a2503bf6d687aed27b9f4455d82eb"},{"url":"https://git.kernel.org/stable/c/3db4395332e7050ef9ddeb3052e6b5019f2a2a59"},{"url":"https://git.kernel.org/stable/c/440ab7f97261bc28501636a13998e1b1946d2e79"},{"url":"https://git.kernel.org/stable/c/dd89a81d850fa9a65f67b4527c0e420d15bf836c"}],"title":"fou: remove warn in gue_gro_receive on unsupported protocol","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2024-44940","datePublished":"2024-08-26T11:20:44.914Z","dateReserved":"2024-08-21T05:34:56.664Z","dateUpdated":"2026-01-05T10:52:37.442Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-08-26 12:15:06","lastModifiedDate":"2026-04-01 18:08:20","problem_types":["NVD-CWE-noinfo"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","matchCriteriaId":"FA6FEEC2-9F11-4643-8827-749718254FED"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.18","versionEndExcluding":"5.10.234","matchCriteriaId":"438769E0-37FC-46FA-92EE-B5F1224483B9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.174","matchCriteriaId":"419FD073-1517-4FD5-8158-F94BC68A1E89"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.107","matchCriteriaId":"53954FF8-CB48-4302-BC4C-9DA7A88F44A2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.6.47","matchCriteriaId":"F450D4D2-61CE-4595-B7D1-CA382E2028E9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.10.6","matchCriteriaId":"C1CDF130-CCA6-47F6-9718-8949BF4E05CC"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"44940","Ordinal":"1","Title":"fou: remove warn in gue_gro_receive on unsupported protocol","CVE":"CVE-2024-44940","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"44940","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nfou: remove warn in gue_gro_receive on unsupported protocol\n\nDrop the WARN_ON_ONCE inn gue_gro_receive if the encapsulated type is\nnot known or does not have a GRO handler.\n\nSuch a packet is easily constructed. Syzbot generates them and sets\noff this warning.\n\nRemove the warning as it is expected and not actionable.\n\nThe warning was previously reduced from WARN_ON to WARN_ON_ONCE in\ncommit 270136613bf7 (\"fou: Do WARN_ON_ONCE in gue_gro_receive for bad\nproto callbacks\").","Type":"Description","Title":"fou: remove warn in gue_gro_receive on unsupported protocol"}]}}}