Bug 1228327 (CVE-2024-41091)

Summary: VUL-0: CVE-2024-41091: kernel: virtio-net: tun: mlx5_core short frame denial of service
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Thomas Bogendoerfer <tbogendoerfer>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: camila.matos, vasant.karasulli
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/415060/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-41091:6.5:(AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-07-25 10:13:48 UTC
A denial-of-service (DoS) attack issue was discovered in the Linux kernel. A KVM guest VM using virtio-net can crash the Linux host by sending a short packet (i.e.  size < ETH_HLEN). The packet may traverse through vhost-net, macvtap and vlan without any validation/drop. When this packet is presented to mlx5 driver on the host side, the host panic happens, since mlx5_core assumes the frame size is always >= ETH_HLEN.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-41091
https://seclists.org/oss-sec/2024/q3/110
https://bugzilla.redhat.com/show_bug.cgi?id=2299336
Comment 1 Camila Camargo de Matos 2024-07-25 10:16:39 UTC
This vulnerability is related to code present in drivers/net/tun.c.