Skip to main content

CVE-2024-35901: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-35901cvecve-2024-35901
Published: Sun May 19 2024 (05/19/2024, 08:34:54 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix Rx DMA datasize and skb_over_panic mana_get_rxbuf_cfg() aligns the RX buffer's DMA datasize to be multiple of 64. So a packet slightly bigger than mtu+14, say 1536, can be received and cause skb_over_panic. Sample dmesg: [ 5325.237162] skbuff: skb_over_panic: text:ffffffffc043277a len:1536 put:1536 head:ff1100018b517000 data:ff1100018b517100 tail:0x700 end:0x6ea dev:<NULL> [ 5325.243689] ------------[ cut here ]------------ [ 5325.245748] kernel BUG at net/core/skbuff.c:192! [ 5325.247838] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI [ 5325.258374] RIP: 0010:skb_panic+0x4f/0x60 [ 5325.302941] Call Trace: [ 5325.304389] <IRQ> [ 5325.315794] ? skb_panic+0x4f/0x60 [ 5325.317457] ? asm_exc_invalid_op+0x1f/0x30 [ 5325.319490] ? skb_panic+0x4f/0x60 [ 5325.321161] skb_put+0x4e/0x50 [ 5325.322670] mana_poll+0x6fa/0xb50 [mana] [ 5325.324578] __napi_poll+0x33/0x1e0 [ 5325.326328] net_rx_action+0x12e/0x280 As discussed internally, this alignment is not necessary. To fix this bug, remove it from the code. So oversized packets will be marked as CQE_RX_TRUNCATED by NIC, and dropped.

AI-Powered Analysis

AILast updated: 06/29/2025, 07:56:57 UTC

Technical Analysis

CVE-2024-35901 is a vulnerability identified in the Linux kernel's network stack, specifically within the 'mana' driver component responsible for handling network packets. The issue arises from the function mana_get_rxbuf_cfg(), which aligns the RX buffer's DMA datasize to multiples of 64 bytes. This alignment can cause the system to accept packets slightly larger than the configured MTU plus Ethernet header (e.g., 1536 bytes), leading to a buffer overflow condition known as skb_over_panic. This condition triggers a kernel panic due to an invalid skb (socket buffer) length, as demonstrated by kernel logs showing skb_over_panic and a BUG at net/core/skbuff.c. The root cause is that the alignment is unnecessary and causes the kernel to mishandle oversized packets. The fix involves removing this alignment logic so that oversized packets are correctly marked as truncated by the NIC (CQE_RX_TRUNCATED) and dropped, preventing the panic. This vulnerability can cause a denial of service (DoS) by crashing the kernel when processing crafted network packets, potentially disrupting network services or causing system instability. No known exploits are currently reported in the wild, and the vulnerability affects Linux kernel versions identified by specific commits, indicating it is a recent issue. The vulnerability does not require user interaction or authentication to be triggered, as it is exploitable remotely via network packets processed by the affected driver.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to servers, network appliances, and embedded devices running vulnerable Linux kernels with the 'mana' driver enabled. The impact is mainly a denial of service through kernel panics, which can disrupt critical network infrastructure, including data centers, cloud providers, and telecommunications equipment. Organizations relying on Linux-based network devices or servers could experience outages or degraded service availability if targeted by crafted network traffic exploiting this flaw. Given the kernel panic nature, the integrity and confidentiality of data are less directly impacted; however, availability loss can have cascading effects on business operations, especially for service providers and enterprises with high uptime requirements. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels means that attackers could develop exploits, increasing future threat levels. European organizations with critical infrastructure or those in sectors like finance, healthcare, and government should prioritize mitigation to avoid potential service disruptions.

Mitigation Recommendations

1. Apply the official Linux kernel patches that remove the problematic RX buffer alignment logic as soon as they become available from trusted Linux distributions or kernel maintainers. 2. Monitor vendor advisories and update network drivers and kernel versions promptly to incorporate the fix. 3. Implement network-level filtering to block or rate-limit suspicious oversized packets that exceed typical MTU sizes, reducing exposure to crafted packets that could trigger the vulnerability. 4. Employ intrusion detection systems (IDS) with signatures or anomaly detection capable of identifying malformed or oversized packets targeting the mana driver. 5. For critical systems, consider isolating vulnerable devices from untrusted networks or deploying network segmentation to limit exposure. 6. Maintain comprehensive logging and monitoring to detect kernel panics or unusual network traffic patterns indicative of exploitation attempts. 7. Conduct regular vulnerability assessments and penetration testing focusing on network stack robustness to identify similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T13:50:33.114Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe211f

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 7:56:57 AM

Last updated: 8/15/2025, 8:00:01 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats