CVE-2024-35975: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix transmit scheduler resource leak Inorder to support shaping and scheduling, Upon class creation Netdev driver allocates trasmit schedulers. The previous patch which added support for Round robin scheduling has a bug due to which driver is not freeing transmit schedulers post class deletion. This patch fixes the same.
AI Analysis
Technical Summary
CVE-2024-35975 is a vulnerability identified in the Linux kernel specifically related to the octeontx2-pf network driver. The vulnerability arises from a resource leak in the transmit scheduler component used for shaping and scheduling network traffic. When a class is created, the network device driver allocates transmit schedulers to manage packet transmission order and bandwidth allocation. A prior patch introduced support for Round Robin scheduling but contained a bug that prevented the driver from properly freeing these transmit scheduler resources when the class was deleted. This results in a resource leak where allocated transmit schedulers remain in memory even after they are no longer needed. Over time, this leak could lead to resource exhaustion on the affected system, potentially degrading network performance or causing instability in the network driver. The vulnerability does not appear to allow direct code execution or privilege escalation, but the improper resource management could be exploited indirectly to cause denial of service conditions or impact system reliability. The issue has been resolved by a patch that ensures transmit schedulers are correctly freed upon class deletion, preventing the resource leak. The vulnerability affects specific versions of the Linux kernel containing the faulty patch, and no known exploits are currently reported in the wild. No CVSS score has been assigned yet, and the vulnerability is categorized as published and recognized by the Linux project and CISA enrichment.
Potential Impact
For European organizations, the impact of CVE-2024-35975 primarily concerns network infrastructure stability and reliability. Organizations utilizing Linux-based systems with the octeontx2-pf driver—commonly found in network appliances or servers handling traffic shaping and scheduling—may experience degraded network performance or potential denial of service if the resource leak accumulates over time. This could affect critical services relying on stable network throughput, such as telecommunications providers, data centers, cloud service operators, and enterprises with high network traffic demands. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could disrupt business operations, especially in sectors requiring high uptime and network reliability. Given the absence of known exploits, the immediate risk is moderate, but unpatched systems remain vulnerable to potential future exploitation or inadvertent service degradation. European organizations with stringent uptime requirements or those operating critical infrastructure should prioritize patching to maintain service continuity.
Mitigation Recommendations
To mitigate CVE-2024-35975, European organizations should: 1) Identify Linux systems running kernels with the affected octeontx2-pf driver versions, particularly those involved in network traffic shaping or scheduling. 2) Apply the official Linux kernel patch that fixes the transmit scheduler resource leak as soon as it becomes available in their distribution or vendor kernel updates. 3) Monitor network device driver resource usage and system logs for signs of resource leaks or network performance degradation that could indicate the vulnerability's effects. 4) Implement proactive resource management and capacity planning to detect abnormal resource consumption early. 5) For environments where immediate patching is challenging, consider temporary workarounds such as limiting class creation/deletion frequency or restarting affected network services during maintenance windows to reclaim leaked resources. 6) Maintain up-to-date inventories of network drivers and kernel versions to quickly assess exposure to similar vulnerabilities in the future. These steps go beyond generic advice by focusing on driver-specific monitoring and operational controls tailored to the vulnerability's nature.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2024-35975: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix transmit scheduler resource leak Inorder to support shaping and scheduling, Upon class creation Netdev driver allocates trasmit schedulers. The previous patch which added support for Round robin scheduling has a bug due to which driver is not freeing transmit schedulers post class deletion. This patch fixes the same.
AI-Powered Analysis
Technical Analysis
CVE-2024-35975 is a vulnerability identified in the Linux kernel specifically related to the octeontx2-pf network driver. The vulnerability arises from a resource leak in the transmit scheduler component used for shaping and scheduling network traffic. When a class is created, the network device driver allocates transmit schedulers to manage packet transmission order and bandwidth allocation. A prior patch introduced support for Round Robin scheduling but contained a bug that prevented the driver from properly freeing these transmit scheduler resources when the class was deleted. This results in a resource leak where allocated transmit schedulers remain in memory even after they are no longer needed. Over time, this leak could lead to resource exhaustion on the affected system, potentially degrading network performance or causing instability in the network driver. The vulnerability does not appear to allow direct code execution or privilege escalation, but the improper resource management could be exploited indirectly to cause denial of service conditions or impact system reliability. The issue has been resolved by a patch that ensures transmit schedulers are correctly freed upon class deletion, preventing the resource leak. The vulnerability affects specific versions of the Linux kernel containing the faulty patch, and no known exploits are currently reported in the wild. No CVSS score has been assigned yet, and the vulnerability is categorized as published and recognized by the Linux project and CISA enrichment.
Potential Impact
For European organizations, the impact of CVE-2024-35975 primarily concerns network infrastructure stability and reliability. Organizations utilizing Linux-based systems with the octeontx2-pf driver—commonly found in network appliances or servers handling traffic shaping and scheduling—may experience degraded network performance or potential denial of service if the resource leak accumulates over time. This could affect critical services relying on stable network throughput, such as telecommunications providers, data centers, cloud service operators, and enterprises with high network traffic demands. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact could disrupt business operations, especially in sectors requiring high uptime and network reliability. Given the absence of known exploits, the immediate risk is moderate, but unpatched systems remain vulnerable to potential future exploitation or inadvertent service degradation. European organizations with stringent uptime requirements or those operating critical infrastructure should prioritize patching to maintain service continuity.
Mitigation Recommendations
To mitigate CVE-2024-35975, European organizations should: 1) Identify Linux systems running kernels with the affected octeontx2-pf driver versions, particularly those involved in network traffic shaping or scheduling. 2) Apply the official Linux kernel patch that fixes the transmit scheduler resource leak as soon as it becomes available in their distribution or vendor kernel updates. 3) Monitor network device driver resource usage and system logs for signs of resource leaks or network performance degradation that could indicate the vulnerability's effects. 4) Implement proactive resource management and capacity planning to detect abnormal resource consumption early. 5) For environments where immediate patching is challenging, consider temporary workarounds such as limiting class creation/deletion frequency or restarting affected network services during maintenance windows to reclaim leaked resources. 6) Maintain up-to-date inventories of network drivers and kernel versions to quickly assess exposure to similar vulnerabilities in the future. These steps go beyond generic advice by focusing on driver-specific monitoring and operational controls tailored to the vulnerability's nature.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.143Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe2349
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 8:42:05 AM
Last updated: 7/29/2025, 11:17:44 PM
Views: 8
Related Threats
CVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumCVE-2025-8720: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in morehawes Plugin README Parser
MediumCVE-2025-8091: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ashanjay EventON – Events Calendar
MediumCVE-2025-8080: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alobaidi Alobaidi Captcha
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.