CVE-2024-35901: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix Rx DMA datasize and skb_over_panic mana_get_rxbuf_cfg() aligns the RX buffer's DMA datasize to be multiple of 64. So a packet slightly bigger than mtu+14, say 1536, can be received and cause skb_over_panic. Sample dmesg: [ 5325.237162] skbuff: skb_over_panic: text:ffffffffc043277a len:1536 put:1536 head:ff1100018b517000 data:ff1100018b517100 tail:0x700 end:0x6ea dev:<NULL> [ 5325.243689] ------------[ cut here ]------------ [ 5325.245748] kernel BUG at net/core/skbuff.c:192! [ 5325.247838] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI [ 5325.258374] RIP: 0010:skb_panic+0x4f/0x60 [ 5325.302941] Call Trace: [ 5325.304389] <IRQ> [ 5325.315794] ? skb_panic+0x4f/0x60 [ 5325.317457] ? asm_exc_invalid_op+0x1f/0x30 [ 5325.319490] ? skb_panic+0x4f/0x60 [ 5325.321161] skb_put+0x4e/0x50 [ 5325.322670] mana_poll+0x6fa/0xb50 [mana] [ 5325.324578] __napi_poll+0x33/0x1e0 [ 5325.326328] net_rx_action+0x12e/0x280 As discussed internally, this alignment is not necessary. To fix this bug, remove it from the code. So oversized packets will be marked as CQE_RX_TRUNCATED by NIC, and dropped.
AI Analysis
Technical Summary
CVE-2024-35901 is a vulnerability identified in the Linux kernel's network stack, specifically within the 'mana' driver component responsible for handling network packets. The issue arises from the function mana_get_rxbuf_cfg(), which aligns the RX buffer's DMA datasize to multiples of 64 bytes. This alignment can cause the system to accept packets slightly larger than the configured MTU plus Ethernet header (e.g., 1536 bytes), leading to a buffer overflow condition known as skb_over_panic. This condition triggers a kernel panic due to an invalid skb (socket buffer) length, as demonstrated by kernel logs showing skb_over_panic and a BUG at net/core/skbuff.c. The root cause is that the alignment is unnecessary and causes the kernel to mishandle oversized packets. The fix involves removing this alignment logic so that oversized packets are correctly marked as truncated by the NIC (CQE_RX_TRUNCATED) and dropped, preventing the panic. This vulnerability can cause a denial of service (DoS) by crashing the kernel when processing crafted network packets, potentially disrupting network services or causing system instability. No known exploits are currently reported in the wild, and the vulnerability affects Linux kernel versions identified by specific commits, indicating it is a recent issue. The vulnerability does not require user interaction or authentication to be triggered, as it is exploitable remotely via network packets processed by the affected driver.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to servers, network appliances, and embedded devices running vulnerable Linux kernels with the 'mana' driver enabled. The impact is mainly a denial of service through kernel panics, which can disrupt critical network infrastructure, including data centers, cloud providers, and telecommunications equipment. Organizations relying on Linux-based network devices or servers could experience outages or degraded service availability if targeted by crafted network traffic exploiting this flaw. Given the kernel panic nature, the integrity and confidentiality of data are less directly impacted; however, availability loss can have cascading effects on business operations, especially for service providers and enterprises with high uptime requirements. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels means that attackers could develop exploits, increasing future threat levels. European organizations with critical infrastructure or those in sectors like finance, healthcare, and government should prioritize mitigation to avoid potential service disruptions.
Mitigation Recommendations
1. Apply the official Linux kernel patches that remove the problematic RX buffer alignment logic as soon as they become available from trusted Linux distributions or kernel maintainers. 2. Monitor vendor advisories and update network drivers and kernel versions promptly to incorporate the fix. 3. Implement network-level filtering to block or rate-limit suspicious oversized packets that exceed typical MTU sizes, reducing exposure to crafted packets that could trigger the vulnerability. 4. Employ intrusion detection systems (IDS) with signatures or anomaly detection capable of identifying malformed or oversized packets targeting the mana driver. 5. For critical systems, consider isolating vulnerable devices from untrusted networks or deploying network segmentation to limit exposure. 6. Maintain comprehensive logging and monitoring to detect kernel panics or unusual network traffic patterns indicative of exploitation attempts. 7. Conduct regular vulnerability assessments and penetration testing focusing on network stack robustness to identify similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-35901: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix Rx DMA datasize and skb_over_panic mana_get_rxbuf_cfg() aligns the RX buffer's DMA datasize to be multiple of 64. So a packet slightly bigger than mtu+14, say 1536, can be received and cause skb_over_panic. Sample dmesg: [ 5325.237162] skbuff: skb_over_panic: text:ffffffffc043277a len:1536 put:1536 head:ff1100018b517000 data:ff1100018b517100 tail:0x700 end:0x6ea dev:<NULL> [ 5325.243689] ------------[ cut here ]------------ [ 5325.245748] kernel BUG at net/core/skbuff.c:192! [ 5325.247838] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI [ 5325.258374] RIP: 0010:skb_panic+0x4f/0x60 [ 5325.302941] Call Trace: [ 5325.304389] <IRQ> [ 5325.315794] ? skb_panic+0x4f/0x60 [ 5325.317457] ? asm_exc_invalid_op+0x1f/0x30 [ 5325.319490] ? skb_panic+0x4f/0x60 [ 5325.321161] skb_put+0x4e/0x50 [ 5325.322670] mana_poll+0x6fa/0xb50 [mana] [ 5325.324578] __napi_poll+0x33/0x1e0 [ 5325.326328] net_rx_action+0x12e/0x280 As discussed internally, this alignment is not necessary. To fix this bug, remove it from the code. So oversized packets will be marked as CQE_RX_TRUNCATED by NIC, and dropped.
AI-Powered Analysis
Technical Analysis
CVE-2024-35901 is a vulnerability identified in the Linux kernel's network stack, specifically within the 'mana' driver component responsible for handling network packets. The issue arises from the function mana_get_rxbuf_cfg(), which aligns the RX buffer's DMA datasize to multiples of 64 bytes. This alignment can cause the system to accept packets slightly larger than the configured MTU plus Ethernet header (e.g., 1536 bytes), leading to a buffer overflow condition known as skb_over_panic. This condition triggers a kernel panic due to an invalid skb (socket buffer) length, as demonstrated by kernel logs showing skb_over_panic and a BUG at net/core/skbuff.c. The root cause is that the alignment is unnecessary and causes the kernel to mishandle oversized packets. The fix involves removing this alignment logic so that oversized packets are correctly marked as truncated by the NIC (CQE_RX_TRUNCATED) and dropped, preventing the panic. This vulnerability can cause a denial of service (DoS) by crashing the kernel when processing crafted network packets, potentially disrupting network services or causing system instability. No known exploits are currently reported in the wild, and the vulnerability affects Linux kernel versions identified by specific commits, indicating it is a recent issue. The vulnerability does not require user interaction or authentication to be triggered, as it is exploitable remotely via network packets processed by the affected driver.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to servers, network appliances, and embedded devices running vulnerable Linux kernels with the 'mana' driver enabled. The impact is mainly a denial of service through kernel panics, which can disrupt critical network infrastructure, including data centers, cloud providers, and telecommunications equipment. Organizations relying on Linux-based network devices or servers could experience outages or degraded service availability if targeted by crafted network traffic exploiting this flaw. Given the kernel panic nature, the integrity and confidentiality of data are less directly impacted; however, availability loss can have cascading effects on business operations, especially for service providers and enterprises with high uptime requirements. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels means that attackers could develop exploits, increasing future threat levels. European organizations with critical infrastructure or those in sectors like finance, healthcare, and government should prioritize mitigation to avoid potential service disruptions.
Mitigation Recommendations
1. Apply the official Linux kernel patches that remove the problematic RX buffer alignment logic as soon as they become available from trusted Linux distributions or kernel maintainers. 2. Monitor vendor advisories and update network drivers and kernel versions promptly to incorporate the fix. 3. Implement network-level filtering to block or rate-limit suspicious oversized packets that exceed typical MTU sizes, reducing exposure to crafted packets that could trigger the vulnerability. 4. Employ intrusion detection systems (IDS) with signatures or anomaly detection capable of identifying malformed or oversized packets targeting the mana driver. 5. For critical systems, consider isolating vulnerable devices from untrusted networks or deploying network segmentation to limit exposure. 6. Maintain comprehensive logging and monitoring to detect kernel panics or unusual network traffic patterns indicative of exploitation attempts. 7. Conduct regular vulnerability assessments and penetration testing focusing on network stack robustness to identify similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.114Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe211f
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 7:56:57 AM
Last updated: 8/15/2025, 8:00:01 AM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.