Skip to main content

CVE-2024-56656: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-56656cvecve-2024-56656
Published: Fri Dec 27 2024 (12/27/2024, 15:06:19 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips The 5760X (P7) chip's HW GRO/LRO interface is very similar to that of the previous generation (5750X or P5). However, the aggregation ID fields in the completion structures on P7 have been redefined from 16 bits to 12 bits. The freed up 4 bits are redefined for part of the metadata such as the VLAN ID. The aggregation ID mask was not modified when adding support for P7 chips. Including the extra 4 bits for the aggregation ID can potentially cause the driver to store or fetch the packet header of GRO/LRO packets in the wrong TPA buffer. It may hit the BUG() condition in __skb_pull() because the SKB contains no valid packet header: kernel BUG at include/linux/skbuff.h:2766! Oops: invalid opcode: 0000 1 PREEMPT SMP NOPTI CPU: 4 UID: 0 PID: 0 Comm: swapper/4 Kdump: loaded Tainted: G OE 6.12.0-rc2+ #7 Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE Hardware name: Dell Inc. PowerEdge R760/0VRV9X, BIOS 1.0.1 12/27/2022 RIP: 0010:eth_type_trans+0xda/0x140 Code: 80 00 00 00 eb c1 8b 47 70 2b 47 74 48 8b 97 d0 00 00 00 83 f8 01 7e 1b 48 85 d2 74 06 66 83 3a ff 74 09 b8 00 04 00 00 eb a5 <0f> 0b b8 00 01 00 00 eb 9c 48 85 ff 74 eb 31 f6 b9 02 00 00 00 48 RSP: 0018:ff615003803fcc28 EFLAGS: 00010283 RAX: 00000000000022d2 RBX: 0000000000000003 RCX: ff2e8c25da334040 RDX: 0000000000000040 RSI: ff2e8c25c1ce8000 RDI: ff2e8c25869f9000 RBP: ff2e8c258c31c000 R08: ff2e8c25da334000 R09: 0000000000000001 R10: ff2e8c25da3342c0 R11: ff2e8c25c1ce89c0 R12: ff2e8c258e0990b0 R13: ff2e8c25bb120000 R14: ff2e8c25c1ce89c0 R15: ff2e8c25869f9000 FS: 0000000000000000(0000) GS:ff2e8c34be300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055f05317e4c8 CR3: 000000108bac6006 CR4: 0000000000773ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: <IRQ> ? die+0x33/0x90 ? do_trap+0xd9/0x100 ? eth_type_trans+0xda/0x140 ? do_error_trap+0x65/0x80 ? eth_type_trans+0xda/0x140 ? exc_invalid_op+0x4e/0x70 ? eth_type_trans+0xda/0x140 ? asm_exc_invalid_op+0x16/0x20 ? eth_type_trans+0xda/0x140 bnxt_tpa_end+0x10b/0x6b0 [bnxt_en] ? bnxt_tpa_start+0x195/0x320 [bnxt_en] bnxt_rx_pkt+0x902/0xd90 [bnxt_en] ? __bnxt_tx_int.constprop.0+0x89/0x300 [bnxt_en] ? kmem_cache_free+0x343/0x440 ? __bnxt_tx_int.constprop.0+0x24f/0x300 [bnxt_en] __bnxt_poll_work+0x193/0x370 [bnxt_en] bnxt_poll_p5+0x9a/0x300 [bnxt_en] ? try_to_wake_up+0x209/0x670 __napi_poll+0x29/0x1b0 Fix it by redefining the aggregation ID mask for P5_PLUS chips to be 12 bits. This will work because the maximum aggregation ID is less than 4096 on all P5_PLUS chips.

AI-Powered Analysis

AILast updated: 06/28/2025, 06:40:31 UTC

Technical Analysis

CVE-2024-56656 is a vulnerability identified in the Linux kernel's bnxt_en network driver, specifically affecting Broadcom NetXtreme-E (bnxt) Ethernet devices using the 5760X (P7) chip. The issue arises from an incorrect aggregation ID mask used in the driver code when handling hardware GRO (Generic Receive Offload) and LRO (Large Receive Offload) interfaces. The 5760X chip redefines the aggregation ID field size from 16 bits to 12 bits, reallocating the freed 4 bits for metadata such as VLAN ID. However, the driver failed to update the aggregation ID mask accordingly, causing it to potentially include these extra bits incorrectly. This miscalculation can lead to the driver storing or fetching packet headers in the wrong TPA (TCP Packet Aggregation) buffer. As a result, the kernel may hit a BUG() condition in the __skb_pull() function due to invalid or missing packet headers in the socket buffer (SKB). This manifests as a kernel oops or crash, with an invalid opcode exception and system instability. The vulnerability is triggered during packet processing in the network stack, specifically in the eth_type_trans function and related bnxt_en driver routines. The fix involves redefining the aggregation ID mask for P5_PLUS chips (including the 5760X) to 12 bits, aligning with the hardware specification and preventing buffer mismanagement. This correction ensures that packet headers are correctly handled, avoiding kernel panics and maintaining system stability. The vulnerability does not require user interaction or authentication to trigger, as it occurs during normal network packet processing on affected hardware. No known exploits are currently reported in the wild, and the issue is specific to Linux kernel versions incorporating the affected bnxt_en driver code prior to the patch.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to servers and infrastructure running Linux kernels with the affected bnxt_en driver on hardware equipped with Broadcom 5760X (P7) network chips. Such systems may experience kernel crashes or oops events leading to denial of service (DoS) conditions, disrupting critical network services and applications. This can impact data center operations, cloud service providers, and enterprises relying on Linux-based networking equipment. The instability may cause unexpected downtime, data transmission interruptions, and potential cascading failures in network-dependent services. While the vulnerability does not directly lead to privilege escalation or data leakage, the resulting DoS can affect availability and operational continuity. European organizations with high reliance on Linux servers for networking, especially those using Dell PowerEdge R760 or similar hardware known to incorporate these chips, are at higher risk. The disruption could affect sectors such as finance, telecommunications, government, and critical infrastructure where uptime and network reliability are paramount. Additionally, the complexity of the issue means that without timely patching, troubleshooting kernel crashes may be challenging, increasing operational costs and risk exposure.

Mitigation Recommendations

To mitigate CVE-2024-56656, European organizations should: 1) Identify and inventory Linux systems using Broadcom 5760X (P7) network chips, particularly those running the bnxt_en driver. 2) Apply the official Linux kernel patches that redefine the aggregation ID mask to 12 bits for P5_PLUS chips. This patch is included in kernel versions released after the vulnerability disclosure date (post-December 27, 2024). 3) For environments where immediate patching is not feasible, consider temporarily disabling GRO/LRO offloading on affected network interfaces using ethtool commands (e.g., `ethtool -K <interface> gro off lro off`) to reduce the risk of triggering the bug. 4) Monitor kernel logs for oops or BUG() messages related to eth_type_trans or bnxt_en driver functions to detect potential exploitation or crashes. 5) Engage with hardware vendors (e.g., Dell) and Linux distribution maintainers to ensure timely updates and support for affected systems. 6) Implement robust system monitoring and automated reboot or failover mechanisms to minimize downtime in case of kernel crashes. 7) Review network traffic patterns and consider isolating critical systems to limit exposure until patches are applied. These steps go beyond generic advice by focusing on hardware-specific identification, temporary configuration changes, and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-27T15:00:39.841Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde48f

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 6:40:31 AM

Last updated: 8/12/2025, 9:18:22 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats