Skip to main content

CVE-2024-46784: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-46784cvecve-2024-46784
Published: Wed Sep 18 2024 (09/18/2024, 07:12:40 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup Currently napi_disable() gets called during rxq and txq cleanup, even before napi is enabled and hrtimer is initialized. It causes kernel panic. ? page_fault_oops+0x136/0x2b0 ? page_counter_cancel+0x2e/0x80 ? do_user_addr_fault+0x2f2/0x640 ? refill_obj_stock+0xc4/0x110 ? exc_page_fault+0x71/0x160 ? asm_exc_page_fault+0x27/0x30 ? __mmdrop+0x10/0x180 ? __mmdrop+0xec/0x180 ? hrtimer_active+0xd/0x50 hrtimer_try_to_cancel+0x2c/0xf0 hrtimer_cancel+0x15/0x30 napi_disable+0x65/0x90 mana_destroy_rxq+0x4c/0x2f0 mana_create_rxq.isra.0+0x56c/0x6d0 ? mana_uncfg_vport+0x50/0x50 mana_alloc_queues+0x21b/0x320 ? skb_dequeue+0x5f/0x80

AI-Powered Analysis

AILast updated: 06/29/2025, 01:41:56 UTC

Technical Analysis

CVE-2024-46784 is a vulnerability identified in the Linux kernel's network subsystem, specifically within the 'mana' driver component responsible for managing network queues. The flaw arises from improper error handling during the creation and cleanup of transmit (txq) and receive (rxq) queues using the NAPI (New API) mechanism. The vulnerability occurs because napi_disable() is called prematurely during the cleanup process, before NAPI is enabled and before the high-resolution timer (hrtimer) is initialized. This sequence leads to a kernel panic, causing a denial of service (DoS) condition. The kernel panic is triggered by a page fault in the error handling path, as evidenced by the stack trace involving functions such as page_fault_oops, hrtimer_try_to_cancel, napi_disable, and mana_destroy_rxq. The issue affects specific Linux kernel versions identified by commit hashes (e1b5683ff62e7b328317aec08869495992053e9d), indicating a narrow range of affected builds. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical in nature and requires kernel-level access to trigger, typically affecting systems running the vulnerable Linux kernel with the mana driver enabled. The root cause is a race or sequencing error in the cleanup logic of network queues, leading to unsafe calls on uninitialized structures, resulting in system crashes.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments using Linux servers or network appliances with the affected kernel versions and the mana network driver enabled. The impact is a potential denial of service through kernel panic, which can disrupt critical network services, leading to downtime and operational impact. This is particularly concerning for data centers, cloud service providers, and enterprises relying on Linux-based infrastructure for networking and communications. While the vulnerability does not directly expose data confidentiality or integrity, the availability impact can be significant, especially in high-availability or real-time systems. Additionally, repeated exploitation attempts could lead to service instability, affecting business continuity. Given the lack of known exploits, the immediate threat level is moderate, but the potential for exploitation exists if attackers develop triggers for this flaw. European organizations with critical infrastructure or those in sectors such as finance, telecommunications, and government services could face operational disruptions if unpatched systems are targeted.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems running the affected kernel versions, focusing on those with the mana driver enabled. 2) Apply the official Linux kernel patches or updates that address this issue as soon as they become available from trusted sources such as the Linux kernel mailing list or vendor security advisories. 3) If immediate patching is not feasible, consider disabling the mana driver if it is not essential to operations to prevent the vulnerable code path from being executed. 4) Implement robust monitoring for kernel panics and system crashes to detect potential exploitation attempts early. 5) Employ kernel live patching solutions where supported to minimize downtime during patch deployment. 6) Conduct thorough testing of network-related kernel updates in staging environments to ensure stability before production rollout. 7) Maintain strict access controls to limit kernel-level access to trusted administrators only, reducing the risk of exploitation. These steps go beyond generic advice by focusing on driver-specific mitigation and operational controls tailored to the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.277Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9827c4522896dcbe12d5

Added to database: 5/21/2025, 9:08:55 AM

Last enriched: 6/29/2025, 1:41:56 AM

Last updated: 8/12/2025, 4:37:40 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats