First published: Mon Jul 22 2024(Updated: )
A denial-of-service (DoS) attack was found in the mlx5 driver in the Linux kernel. A KVM guest VM using virtio-net can crash the host by sending a short packet (i.e. size < ETH_HLEN). The packet may traverse through vhost-net, macvtap and vlan without any validation/drop. When this packet is presented to mlx5 driver on the host side, the kernel panic happens since mlx5_core assumes the frame size is always >= ETH_HLEN. This vulnerability affects both drivers/net/tun.c and drivers/net/tap.c. <a href="https://access.redhat.com/security/cve/CVE-2024-41091">CVE-2024-41091</a> has been assigned to the TUN side of the issue. Reference: <a href="https://www.openwall.com/lists/oss-security/2024/07/24/4">https://www.openwall.com/lists/oss-security/2024/07/24/4</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
debian/linux-6.1 | 6.1.128-1~deb11u1 | |
F5 BIG-IP Next (LTM) | =20.2.1 | 20.3.0 |
F5 BIG-IP Next Central Manager | =20.2.1 | 20.3.0 |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41091 is classified as a denial-of-service (DoS) vulnerability.
To mitigate CVE-2024-41091, update to the specified remedial versions of the affected software.
CVE-2024-41091 affects F5 BIG-IP Next, F5 BIG-IP Next Central Manager, F5 Traffix Systems Signaling Delivery Controller, and certain versions of the Linux kernel.
CVE-2024-41091 is caused by a KVM guest VM sending a malformed short packet that crashes the host machine.
Currently, updating to the fixed versions is the recommended method for addressing CVE-2024-41091.