Skip to main content

CVE-2024-57901: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-57901cvecve-2024-57901
Published: Wed Jan 15 2025 (01/15/2025, 13:05:57 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK Blamed commit forgot MSG_PEEK case, allowing a crash [1] as found by syzbot. Rework vlan_get_protocol_dgram() to not touch skb at all, so that it can be used from many cpus on the same skb. Add a const qualifier to skb argument. [1] skbuff: skb_under_panic: text:ffffffff8a8ccd05 len:29 put:14 head:ffff88807fc8e400 data:ffff88807fc8e3f4 tail:0x11 end:0x140 dev:<NULL> ------------[ cut here ]------------ kernel BUG at net/core/skbuff.c:206 ! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 5892 Comm: syz-executor883 Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline] RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216 Code: 0b 8d 48 c7 c6 86 d5 25 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 5a 69 79 f7 48 83 c4 20 90 <0f> 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 RSP: 0018:ffffc900038d7638 EFLAGS: 00010282 RAX: 0000000000000087 RBX: dffffc0000000000 RCX: 609ffd18ea660600 RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 RBP: ffff88802483c8d0 R08: ffffffff817f0a8c R09: 1ffff9200071ae60 R10: dffffc0000000000 R11: fffff5200071ae61 R12: 0000000000000140 R13: ffff88807fc8e400 R14: ffff88807fc8e3f4 R15: 0000000000000011 FS: 00007fbac5e006c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fbac5e00d58 CR3: 000000001238e000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> skb_push+0xe5/0x100 net/core/skbuff.c:2636 vlan_get_protocol_dgram+0x165/0x290 net/packet/af_packet.c:585 packet_recvmsg+0x948/0x1ef0 net/packet/af_packet.c:3552 sock_recvmsg_nosec net/socket.c:1033 [inline] sock_recvmsg+0x22f/0x280 net/socket.c:1055 ____sys_recvmsg+0x1c6/0x480 net/socket.c:2803 ___sys_recvmsg net/socket.c:2845 [inline] do_recvmmsg+0x426/0xab0 net/socket.c:2940 __sys_recvmmsg net/socket.c:3014 [inline] __do_sys_recvmmsg net/socket.c:3037 [inline] __se_sys_recvmmsg net/socket.c:3030 [inline] __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3030 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f

AI-Powered Analysis

AILast updated: 06/27/2025, 22:56:02 UTC

Technical Analysis

CVE-2024-57901 is a vulnerability identified in the Linux kernel's af_packet subsystem, specifically within the vlan_get_protocol_dgram() function. The issue arises from improper handling of the MSG_PEEK flag in socket message reception, which was overlooked in the original implementation. This flaw can lead to a kernel crash (kernel BUG) due to an invalid opcode triggered when the skb (socket buffer) structure is incorrectly manipulated concurrently by multiple CPUs. The root cause is that vlan_get_protocol_dgram() touched the skb in a non-thread-safe manner, causing data corruption or panic when accessed simultaneously. The vulnerability was discovered by syzbot, an automated kernel fuzzer, which triggered a panic in the skb_under_panic() function, indicating a serious memory or state inconsistency in the network stack. The fix involved reworking vlan_get_protocol_dgram() to avoid modifying the skb, adding a const qualifier to the skb argument to enforce immutability, and properly handling the MSG_PEEK case to prevent the crash. This vulnerability affects multiple Linux kernel versions as identified by their commit hashes, and it is relevant to systems using the af_packet interface for packet socket operations, commonly used in network monitoring, packet capturing, and certain container networking scenarios. Although no known exploits are reported in the wild, the vulnerability can cause denial of service (DoS) through kernel crashes, potentially impacting system availability and stability.

Potential Impact

For European organizations, the impact of CVE-2024-57901 primarily concerns system availability and reliability. Organizations relying on Linux-based infrastructure for critical network functions, including telecommunications, cloud services, data centers, and industrial control systems, may experience unexpected kernel panics leading to service interruptions. The vulnerability could be exploited by local or remote attackers with the ability to send crafted packets to af_packet sockets, causing denial of service. This is particularly relevant for environments using packet capture tools (e.g., tcpdump, Wireshark) or containerized applications that leverage af_packet for network traffic interception. While the vulnerability does not directly expose confidentiality or integrity risks, the resulting crashes could disrupt business operations, cause data loss due to abrupt shutdowns, and increase operational costs due to downtime and recovery efforts. Given the widespread use of Linux in European IT infrastructure, the vulnerability poses a moderate risk that requires timely mitigation to maintain service continuity.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Apply the official Linux kernel patches that address CVE-2024-57901 as soon as they become available from trusted Linux distribution vendors or upstream kernel sources. 2) For environments where immediate patching is not feasible, restrict access to af_packet sockets by limiting user privileges and network namespaces that can create or interact with packet sockets. 3) Monitor kernel logs for signs of skb_under_panic or related kernel oops messages indicative of exploitation attempts or crashes. 4) Employ network segmentation to isolate systems performing packet capture or network monitoring from untrusted networks to reduce exposure. 5) In containerized environments, review and restrict container capabilities related to raw socket access and packet socket creation to minimize attack surface. 6) Conduct thorough testing of updated kernels in staging environments to ensure stability before deployment in production. 7) Maintain up-to-date incident response plans to quickly address potential denial of service incidents caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-01-11T14:45:42.030Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdd1d7

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/27/2025, 10:56:02 PM

Last updated: 8/16/2025, 2:00:22 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats