CVE-2024-57902: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: af_packet: fix vlan_get_tci() vs MSG_PEEK Blamed commit forgot MSG_PEEK case, allowing a crash [1] as found by syzbot. Rework vlan_get_tci() to not touch skb at all, so that it can be used from many cpus on the same skb. Add a const qualifier to skb argument. [1] skbuff: skb_under_panic: text:ffffffff8a8da482 len:32 put:14 head:ffff88807a1d5800 data:ffff88807a1d5810 tail:0x14 end:0x140 dev:<NULL> ------------[ cut here ]------------ kernel BUG at net/core/skbuff.c:206 ! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 5880 Comm: syz-executor172 Not tainted 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline] RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216 Code: 0b 8d 48 c7 c6 9e 6c 26 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 3a 5a 79 f7 48 83 c4 20 90 <0f> 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 RSP: 0018:ffffc90003baf5b8 EFLAGS: 00010286 RAX: 0000000000000087 RBX: dffffc0000000000 RCX: 8565c1eec37aa000 RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 RBP: ffff88802616fb50 R08: ffffffff817f0a4c R09: 1ffff92000775e50 R10: dffffc0000000000 R11: fffff52000775e51 R12: 0000000000000140 R13: ffff88807a1d5800 R14: ffff88807a1d5810 R15: 0000000000000014 FS: 00007fa03261f6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffd65753000 CR3: 0000000031720000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> skb_push+0xe5/0x100 net/core/skbuff.c:2636 vlan_get_tci+0x272/0x550 net/packet/af_packet.c:565 packet_recvmsg+0x13c9/0x1ef0 net/packet/af_packet.c:3616 sock_recvmsg_nosec net/socket.c:1044 [inline] sock_recvmsg+0x22f/0x280 net/socket.c:1066 ____sys_recvmsg+0x1c6/0x480 net/socket.c:2814 ___sys_recvmsg net/socket.c:2856 [inline] do_recvmmsg+0x426/0xab0 net/socket.c:2951 __sys_recvmmsg net/socket.c:3025 [inline] __do_sys_recvmmsg net/socket.c:3048 [inline] __se_sys_recvmmsg net/socket.c:3041 [inline] __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3041 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
AI Analysis
Technical Summary
CVE-2024-57902 is a vulnerability identified in the Linux kernel, specifically within the af_packet subsystem that handles packet sockets. The issue arises from improper handling in the vlan_get_tci() function when processing MSG_PEEK socket messages. The original implementation neglected the MSG_PEEK case, which can lead to a kernel crash due to a kernel BUG triggered by skb (socket buffer) manipulation errors. The vulnerability was discovered by syzbot, an automated kernel fuzzer, which detected a panic caused by invalid skb state during concurrent access. The root cause is that vlan_get_tci() touched the skb data structure in a way that was not safe for concurrent CPU access, leading to race conditions and memory corruption. The fix involved reworking vlan_get_tci() to avoid modifying the skb at all and adding a const qualifier to the skb argument to enforce read-only access. This correction ensures thread-safe access to skb data and prevents kernel panics triggered by crafted MSG_PEEK packets on AF_PACKET sockets. The vulnerability affects multiple Linux kernel versions prior to the patch and can be triggered by local processes that have the ability to open AF_PACKET sockets and send crafted messages. The crash results in a denial of service (DoS) by causing the kernel to panic and reboot or halt, impacting system availability. There is no indication that this vulnerability allows privilege escalation or arbitrary code execution. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-57902 is a potential denial of service on Linux-based systems that utilize AF_PACKET sockets, commonly found in network appliances, servers, and devices performing advanced packet processing or network monitoring. Systems running vulnerable kernel versions may experience kernel panics and reboots when exposed to crafted MSG_PEEK packets, which could be exploited by local users or malicious software with socket access. This could disrupt critical services, especially in sectors relying heavily on Linux infrastructure such as finance, telecommunications, government, and industrial control systems. Although the vulnerability does not directly lead to data breaches or privilege escalation, the resulting downtime and instability could cause operational disruptions, loss of availability, and increased recovery costs. Additionally, denial of service in network devices could degrade network performance or interrupt connectivity, impacting business continuity. Organizations with multi-tenant environments or cloud deployments using affected Linux kernels should be particularly vigilant, as attackers might leverage this flaw to disrupt shared infrastructure.
Mitigation Recommendations
To mitigate CVE-2024-57902, organizations should promptly apply the official Linux kernel patches that address the vlan_get_tci() MSG_PEEK handling issue. If immediate patching is not feasible, consider the following specific measures: 1) Restrict access to AF_PACKET sockets by limiting CAP_NET_RAW capability to trusted users and processes only, reducing the attack surface. 2) Employ kernel lockdown features or mandatory access controls (e.g., SELinux, AppArmor) to prevent unauthorized socket operations. 3) Monitor kernel logs for signs of skb_under_panic or related kernel BUG messages indicative of exploitation attempts. 4) In environments using containerization or virtualization, isolate workloads to minimize the impact of potential kernel crashes. 5) Regularly update kernel versions and subscribe to Linux security advisories to stay informed of patches and related vulnerabilities. 6) Conduct internal audits of network-facing systems to identify and remediate vulnerable kernel versions. These targeted steps go beyond generic advice by focusing on controlling socket access and monitoring for specific kernel panic indicators related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain, Belgium
CVE-2024-57902: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: af_packet: fix vlan_get_tci() vs MSG_PEEK Blamed commit forgot MSG_PEEK case, allowing a crash [1] as found by syzbot. Rework vlan_get_tci() to not touch skb at all, so that it can be used from many cpus on the same skb. Add a const qualifier to skb argument. [1] skbuff: skb_under_panic: text:ffffffff8a8da482 len:32 put:14 head:ffff88807a1d5800 data:ffff88807a1d5810 tail:0x14 end:0x140 dev:<NULL> ------------[ cut here ]------------ kernel BUG at net/core/skbuff.c:206 ! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 5880 Comm: syz-executor172 Not tainted 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline] RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216 Code: 0b 8d 48 c7 c6 9e 6c 26 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 3a 5a 79 f7 48 83 c4 20 90 <0f> 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 RSP: 0018:ffffc90003baf5b8 EFLAGS: 00010286 RAX: 0000000000000087 RBX: dffffc0000000000 RCX: 8565c1eec37aa000 RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 RBP: ffff88802616fb50 R08: ffffffff817f0a4c R09: 1ffff92000775e50 R10: dffffc0000000000 R11: fffff52000775e51 R12: 0000000000000140 R13: ffff88807a1d5800 R14: ffff88807a1d5810 R15: 0000000000000014 FS: 00007fa03261f6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffd65753000 CR3: 0000000031720000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> skb_push+0xe5/0x100 net/core/skbuff.c:2636 vlan_get_tci+0x272/0x550 net/packet/af_packet.c:565 packet_recvmsg+0x13c9/0x1ef0 net/packet/af_packet.c:3616 sock_recvmsg_nosec net/socket.c:1044 [inline] sock_recvmsg+0x22f/0x280 net/socket.c:1066 ____sys_recvmsg+0x1c6/0x480 net/socket.c:2814 ___sys_recvmsg net/socket.c:2856 [inline] do_recvmmsg+0x426/0xab0 net/socket.c:2951 __sys_recvmmsg net/socket.c:3025 [inline] __do_sys_recvmmsg net/socket.c:3048 [inline] __se_sys_recvmmsg net/socket.c:3041 [inline] __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3041 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
AI-Powered Analysis
Technical Analysis
CVE-2024-57902 is a vulnerability identified in the Linux kernel, specifically within the af_packet subsystem that handles packet sockets. The issue arises from improper handling in the vlan_get_tci() function when processing MSG_PEEK socket messages. The original implementation neglected the MSG_PEEK case, which can lead to a kernel crash due to a kernel BUG triggered by skb (socket buffer) manipulation errors. The vulnerability was discovered by syzbot, an automated kernel fuzzer, which detected a panic caused by invalid skb state during concurrent access. The root cause is that vlan_get_tci() touched the skb data structure in a way that was not safe for concurrent CPU access, leading to race conditions and memory corruption. The fix involved reworking vlan_get_tci() to avoid modifying the skb at all and adding a const qualifier to the skb argument to enforce read-only access. This correction ensures thread-safe access to skb data and prevents kernel panics triggered by crafted MSG_PEEK packets on AF_PACKET sockets. The vulnerability affects multiple Linux kernel versions prior to the patch and can be triggered by local processes that have the ability to open AF_PACKET sockets and send crafted messages. The crash results in a denial of service (DoS) by causing the kernel to panic and reboot or halt, impacting system availability. There is no indication that this vulnerability allows privilege escalation or arbitrary code execution. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-57902 is a potential denial of service on Linux-based systems that utilize AF_PACKET sockets, commonly found in network appliances, servers, and devices performing advanced packet processing or network monitoring. Systems running vulnerable kernel versions may experience kernel panics and reboots when exposed to crafted MSG_PEEK packets, which could be exploited by local users or malicious software with socket access. This could disrupt critical services, especially in sectors relying heavily on Linux infrastructure such as finance, telecommunications, government, and industrial control systems. Although the vulnerability does not directly lead to data breaches or privilege escalation, the resulting downtime and instability could cause operational disruptions, loss of availability, and increased recovery costs. Additionally, denial of service in network devices could degrade network performance or interrupt connectivity, impacting business continuity. Organizations with multi-tenant environments or cloud deployments using affected Linux kernels should be particularly vigilant, as attackers might leverage this flaw to disrupt shared infrastructure.
Mitigation Recommendations
To mitigate CVE-2024-57902, organizations should promptly apply the official Linux kernel patches that address the vlan_get_tci() MSG_PEEK handling issue. If immediate patching is not feasible, consider the following specific measures: 1) Restrict access to AF_PACKET sockets by limiting CAP_NET_RAW capability to trusted users and processes only, reducing the attack surface. 2) Employ kernel lockdown features or mandatory access controls (e.g., SELinux, AppArmor) to prevent unauthorized socket operations. 3) Monitor kernel logs for signs of skb_under_panic or related kernel BUG messages indicative of exploitation attempts. 4) In environments using containerization or virtualization, isolate workloads to minimize the impact of potential kernel crashes. 5) Regularly update kernel versions and subscribe to Linux security advisories to stay informed of patches and related vulnerabilities. 6) Conduct internal audits of network-facing systems to identify and remediate vulnerable kernel versions. These targeted steps go beyond generic advice by focusing on controlling socket access and monitoring for specific kernel panic indicators related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-01-11T14:45:42.031Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdd1db
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 6/27/2025, 10:56:13 PM
Last updated: 7/30/2025, 2:38:43 PM
Views: 17
Related Threats
CVE-2025-49895: CWE-352 Cross-Site Request Forgery (CSRF) in iThemes ServerBuddy by PluginBuddy.com
HighCVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.