{"uuid": "323f4f9d-a47c-4f21-b8ed-38345aa67fdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44940", "type": "seen", "source": "https://t.me/cvedetector/4133", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44940 - Linux kernel Fou GRO Receive Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44940 \nPublished : Aug. 26, 2024, 12:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nfou: remove warn in gue_gro_receive on unsupported protocol  \n  \nDrop the WARN_ON_ONCE inn gue_gro_receive if the encapsulated type is  \nnot known or does not have a GRO handler.  \n  \nSuch a packet is easily constructed. Syzbot generates them and sets  \noff this warning.  \n  \nRemove the warning as it is expected and not actionable.  \n  \nThe warning was previously reduced from WARN_ON to WARN_ON_ONCE in  \ncommit 270136613bf7 (\"fou: Do WARN_ON_ONCE in gue_gro_receive for bad  \nproto callbacks\"). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T15:23:51.000000Z"}