CVE-2024-46784: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup Currently napi_disable() gets called during rxq and txq cleanup, even before napi is enabled and hrtimer is initialized. It causes kernel panic. ? page_fault_oops+0x136/0x2b0 ? page_counter_cancel+0x2e/0x80 ? do_user_addr_fault+0x2f2/0x640 ? refill_obj_stock+0xc4/0x110 ? exc_page_fault+0x71/0x160 ? asm_exc_page_fault+0x27/0x30 ? __mmdrop+0x10/0x180 ? __mmdrop+0xec/0x180 ? hrtimer_active+0xd/0x50 hrtimer_try_to_cancel+0x2c/0xf0 hrtimer_cancel+0x15/0x30 napi_disable+0x65/0x90 mana_destroy_rxq+0x4c/0x2f0 mana_create_rxq.isra.0+0x56c/0x6d0 ? mana_uncfg_vport+0x50/0x50 mana_alloc_queues+0x21b/0x320 ? skb_dequeue+0x5f/0x80
AI Analysis
Technical Summary
CVE-2024-46784 is a vulnerability identified in the Linux kernel's network subsystem, specifically within the 'mana' driver component responsible for managing network queues. The flaw arises from improper error handling during the creation and cleanup of transmit (txq) and receive (rxq) queues using the NAPI (New API) mechanism. The vulnerability occurs because napi_disable() is called prematurely during the cleanup process, before NAPI is enabled and before the high-resolution timer (hrtimer) is initialized. This sequence leads to a kernel panic, causing a denial of service (DoS) condition. The kernel panic is triggered by a page fault in the error handling path, as evidenced by the stack trace involving functions such as page_fault_oops, hrtimer_try_to_cancel, napi_disable, and mana_destroy_rxq. The issue affects specific Linux kernel versions identified by commit hashes (e1b5683ff62e7b328317aec08869495992053e9d), indicating a narrow range of affected builds. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical in nature and requires kernel-level access to trigger, typically affecting systems running the vulnerable Linux kernel with the mana driver enabled. The root cause is a race or sequencing error in the cleanup logic of network queues, leading to unsafe calls on uninitialized structures, resulting in system crashes.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments using Linux servers or network appliances with the affected kernel versions and the mana network driver enabled. The impact is a potential denial of service through kernel panic, which can disrupt critical network services, leading to downtime and operational impact. This is particularly concerning for data centers, cloud service providers, and enterprises relying on Linux-based infrastructure for networking and communications. While the vulnerability does not directly expose data confidentiality or integrity, the availability impact can be significant, especially in high-availability or real-time systems. Additionally, repeated exploitation attempts could lead to service instability, affecting business continuity. Given the lack of known exploits, the immediate threat level is moderate, but the potential for exploitation exists if attackers develop triggers for this flaw. European organizations with critical infrastructure or those in sectors such as finance, telecommunications, and government services could face operational disruptions if unpatched systems are targeted.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems running the affected kernel versions, focusing on those with the mana driver enabled. 2) Apply the official Linux kernel patches or updates that address this issue as soon as they become available from trusted sources such as the Linux kernel mailing list or vendor security advisories. 3) If immediate patching is not feasible, consider disabling the mana driver if it is not essential to operations to prevent the vulnerable code path from being executed. 4) Implement robust monitoring for kernel panics and system crashes to detect potential exploitation attempts early. 5) Employ kernel live patching solutions where supported to minimize downtime during patch deployment. 6) Conduct thorough testing of network-related kernel updates in staging environments to ensure stability before production rollout. 7) Maintain strict access controls to limit kernel-level access to trusted administrators only, reducing the risk of exploitation. These steps go beyond generic advice by focusing on driver-specific mitigation and operational controls tailored to the nature of the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-46784: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup Currently napi_disable() gets called during rxq and txq cleanup, even before napi is enabled and hrtimer is initialized. It causes kernel panic. ? page_fault_oops+0x136/0x2b0 ? page_counter_cancel+0x2e/0x80 ? do_user_addr_fault+0x2f2/0x640 ? refill_obj_stock+0xc4/0x110 ? exc_page_fault+0x71/0x160 ? asm_exc_page_fault+0x27/0x30 ? __mmdrop+0x10/0x180 ? __mmdrop+0xec/0x180 ? hrtimer_active+0xd/0x50 hrtimer_try_to_cancel+0x2c/0xf0 hrtimer_cancel+0x15/0x30 napi_disable+0x65/0x90 mana_destroy_rxq+0x4c/0x2f0 mana_create_rxq.isra.0+0x56c/0x6d0 ? mana_uncfg_vport+0x50/0x50 mana_alloc_queues+0x21b/0x320 ? skb_dequeue+0x5f/0x80
AI-Powered Analysis
Technical Analysis
CVE-2024-46784 is a vulnerability identified in the Linux kernel's network subsystem, specifically within the 'mana' driver component responsible for managing network queues. The flaw arises from improper error handling during the creation and cleanup of transmit (txq) and receive (rxq) queues using the NAPI (New API) mechanism. The vulnerability occurs because napi_disable() is called prematurely during the cleanup process, before NAPI is enabled and before the high-resolution timer (hrtimer) is initialized. This sequence leads to a kernel panic, causing a denial of service (DoS) condition. The kernel panic is triggered by a page fault in the error handling path, as evidenced by the stack trace involving functions such as page_fault_oops, hrtimer_try_to_cancel, napi_disable, and mana_destroy_rxq. The issue affects specific Linux kernel versions identified by commit hashes (e1b5683ff62e7b328317aec08869495992053e9d), indicating a narrow range of affected builds. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical in nature and requires kernel-level access to trigger, typically affecting systems running the vulnerable Linux kernel with the mana driver enabled. The root cause is a race or sequencing error in the cleanup logic of network queues, leading to unsafe calls on uninitialized structures, resulting in system crashes.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments using Linux servers or network appliances with the affected kernel versions and the mana network driver enabled. The impact is a potential denial of service through kernel panic, which can disrupt critical network services, leading to downtime and operational impact. This is particularly concerning for data centers, cloud service providers, and enterprises relying on Linux-based infrastructure for networking and communications. While the vulnerability does not directly expose data confidentiality or integrity, the availability impact can be significant, especially in high-availability or real-time systems. Additionally, repeated exploitation attempts could lead to service instability, affecting business continuity. Given the lack of known exploits, the immediate threat level is moderate, but the potential for exploitation exists if attackers develop triggers for this flaw. European organizations with critical infrastructure or those in sectors such as finance, telecommunications, and government services could face operational disruptions if unpatched systems are targeted.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems running the affected kernel versions, focusing on those with the mana driver enabled. 2) Apply the official Linux kernel patches or updates that address this issue as soon as they become available from trusted sources such as the Linux kernel mailing list or vendor security advisories. 3) If immediate patching is not feasible, consider disabling the mana driver if it is not essential to operations to prevent the vulnerable code path from being executed. 4) Implement robust monitoring for kernel panics and system crashes to detect potential exploitation attempts early. 5) Employ kernel live patching solutions where supported to minimize downtime during patch deployment. 6) Conduct thorough testing of network-related kernel updates in staging environments to ensure stability before production rollout. 7) Maintain strict access controls to limit kernel-level access to trusted administrators only, reducing the risk of exploitation. These steps go beyond generic advice by focusing on driver-specific mitigation and operational controls tailored to the nature of the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-11T15:12:18.277Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9827c4522896dcbe12d5
Added to database: 5/21/2025, 9:08:55 AM
Last enriched: 6/29/2025, 1:41:56 AM
Last updated: 8/12/2025, 4:37:40 PM
Views: 20
Related Threats
CVE-2025-7384: CWE-502 Deserialization of Untrusted Data in crmperks Database for Contact Form 7, WPforms, Elementor forms
CriticalCVE-2025-8491: CWE-352 Cross-Site Request Forgery (CSRF) in nikelschubert Easy restaurant menu manager
MediumCVE-2025-0818: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ninjateam File Manager Pro – Filester
MediumCVE-2025-8901: Out of bounds write in Google Chrome
HighCVE-2025-8882: Use after free in Google Chrome
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.