A denial-of-service (DoS) attack was found in the mlx5 driver in the Linux kernel. A KVM guest VM using virtio-net can crash the host by sending a short packet (i.e. size < ETH_HLEN). The packet may traverse through vhost-net, macvtap and vlan without any validation/drop. When this packet is presented to mlx5 driver on the host side, the kernel panic happens since mlx5_core assumes the frame size is always >= ETH_HLEN. This vulnerability affects both drivers/net/tun.c and drivers/net/tap.c. CVE-2024-41091 has been assigned to the TUN side of the issue. Reference: https://www.openwall.com/lists/oss-security/2024/07/24/4
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:5256 https://access.redhat.com/errata/RHSA-2024:5256
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:5257 https://access.redhat.com/errata/RHSA-2024:5257
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:5281 https://access.redhat.com/errata/RHSA-2024:5281
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Via RHSA-2024:5582 https://access.redhat.com/errata/RHSA-2024:5582
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:5673 https://access.redhat.com/errata/RHSA-2024:5673
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:5672 https://access.redhat.com/errata/RHSA-2024:5672
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:5858 https://access.redhat.com/errata/RHSA-2024:5858
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:5928 https://access.redhat.com/errata/RHSA-2024:5928
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2024:6160 https://access.redhat.com/errata/RHSA-2024:6160
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2024:6156 https://access.redhat.com/errata/RHSA-2024:6156
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:6206 https://access.redhat.com/errata/RHSA-2024:6206
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:6242 https://access.redhat.com/errata/RHSA-2024:6242
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:6313 https://access.redhat.com/errata/RHSA-2024:6313
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:6560 https://access.redhat.com/errata/RHSA-2024:6560
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2024:6663 https://access.redhat.com/errata/RHSA-2024:6663
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:6992 https://access.redhat.com/errata/RHSA-2024:6992
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:7001 https://access.redhat.com/errata/RHSA-2024:7001
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:7000 https://access.redhat.com/errata/RHSA-2024:7000
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:7429 https://access.redhat.com/errata/RHSA-2024:7429