CVE-2024-27013Allocation of Resources Without Limits or Throttling in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 1
Latest updateSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: tun: limit printing rate when illegal packet received by tun dev vhost_worker will call tun call backs to receive packets. If too many illegal packets arrives, tun_do_read will keep dumping packet contents. When console is enabled, it will costs much more cpu time to dump packet and soft lockup will be detected. net_ratelimit mechanism can be used to limit the dumping rate. PID: 33036 TASK: ffff949da6f20000 CPU: 23 COMMAND:

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel2.6.354.19.313+7
Debianlinux/linux_kernel< 5.10.216-1+3
CVEListV5linux/linuxef3db4a5954281bc1ea49a4739c88eaea091dc7168459b8e3ee554ce71878af9eb69659b9462c588+8

Also affects: Fedora 38, 39, 40

Patches

🔴Vulnerability Details

3
GHSA
GHSA-hm85-cqwx-6v52: In the Linux kernel, the following vulnerability has been resolved: tun: limit printing rate when illegal packet received by tun dev vhost_worker wi2024-05-01
OSV
CVE-2024-27013: In the Linux kernel, the following vulnerability has been resolved: tun: limit printing rate when illegal packet received by tun dev vhost_worker will2024-05-01
CVEList
tun: limit printing rate when illegal packet received by tun dev2024-05-01

📋Vendor Advisories

20
Ubuntu
Linux kernel vulnerabilities2024-09-18
Ubuntu
Linux kernel vulnerabilities2024-07-30
Ubuntu
Linux kernel vulnerabilities2024-07-26
Ubuntu
Linux kernel vulnerabilities2024-07-26
Ubuntu
Linux kernel vulnerabilities2024-07-26

💬Community

1
Bugzilla
CVE-2024-27013 kernel: tun: limit printing rate when illegal packet received by tun dev2024-05-01
CVE-2024-27013 — Linux vulnerability | cvebase