Bug 1228328 (CVE-2024-41090) - VUL-0: CVE-2024-41090: kernel: virtio-net: tap: mlx5_core short frame denial of service
Summary: VUL-0: CVE-2024-41090: kernel: virtio-net: tap: mlx5_core short frame denial ...
Status: NEW
Alias: CVE-2024-41090
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Thomas Bogendoerfer
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/415059/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-41090:6.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-07-25 10:15 UTC by SMASH SMASH
Modified: 2024-07-25 16:37 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-07-25 10:15:11 UTC
A denial-of-service (DoS) attack issue was discovered in the Linux kernel. A KVM guest VM using virtio-net can crash the Linux host by sending a short packet (i.e.  size < ETH_HLEN). The packet may traverse through vhost-net, macvtap and vlan without any validation/drop. When this packet is presented to mlx5 driver on the host side, the host panic happens, since mlx5_core assumes the frame size is always >= ETH_HLEN.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-41090
https://seclists.org/oss-sec/2024/q3/110
https://bugzilla.redhat.com/show_bug.cgi?id=2299240
Comment 1 Camila Camargo de Matos 2024-07-25 10:16:18 UTC
This vulnerability is related to code present in drivers/net/tap.c.