From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: net: gso: fix tcp fraglist segmentation after pull from frag_list - Description: Fixes an incorrect segmentation of TCP GSO (Generic Segmentation Offload) packets after being pulled from frag_list. The head of the skbuff (socket buffer) contains the protocol header and the first gso_size of data, while other fragments contain full gso_size data. In some extreme cases, TCP pulls all data into the linear part of the skbuff, causing the TCP header pointer in __tcpv4_gso_segment_list_csum to become NULL. 2. Fix Method: - Code Changes: Modifications were made in files and . - Logic Adjustment: Checks the gso_type and SKB_GSO_FRAGLIST flag in the skbuff header. If conditions are met, it checks whether the skbuff size equals 4 times gso_size; if so, it sets the ip_summed field of the skbuff to CHECKSUM_NONE. 3. Impact Scope: - Files: and - Code Lines: A total of 16 lines modified (10 insertions, 4 deletions). 4. Authors and Contributors: - Author: Felix Fietkau - Contributors: Jakub Kicinski, Willem de Bruijn 5. Links and References: - Link: https://lore.kernel.org/netdev/20240828142913.18666-1-shiming.cheng@mediatek.com/ - Reference: https://lore.kernel.org/netdev/20240922150450.3873767-1-willemdebruijn.kernel@gmail.com/ - Fix: bee88cd5bd83 (net: add support for segmenting TCP fraglist GSO packets) 6. Status: - Status: Fixed (merged into master branch) This information helps us understand the nature of the vulnerability, the fix applied, and its scope of impact, enabling better assessment and handling of similar security issues.