First published: Mon Jul 22 2024(Updated: )
A denial-of-service (DoS) attack was found in the mlx5 driver in the Linux kernel. A KVM guest VM using virtio-net can crash the host by sending a short packet (i.e. size < ETH_HLEN). The packet may traverse through vhost-net, macvtap and vlan without any validation/drop. When this packet is presented to mlx5 driver on the host side, the kernel panic happens since mlx5_core assumes the frame size is always >= ETH_HLEN. This vulnerability affects both drivers/net/tun.c and drivers/net/tap.c. <a href="https://access.redhat.com/security/cve/CVE-2024-41091">CVE-2024-41091</a> has been assigned to the TUN side of the issue. Reference: <a href="https://www.openwall.com/lists/oss-security/2024/07/24/4">https://www.openwall.com/lists/oss-security/2024/07/24/4</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next | =20.2.1 | 20.3.0 |
F5 BIG-IP Next Central Manager | =20.2.1 | 20.3.0 |
F5 Traffix SDC | =5.2.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.5-1 6.12.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.