CVE-2024-35890
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-35890 is a vulnerability discovered in the Linux kernel's Generic Receive Offload (GRO) feature. The issue was identified and fixed in March 2024, affecting the kernel's network packet processing functionality. The vulnerability occurs when packets processed with a fragment list are not properly handled during the ownership transfer process (Kernel Git).

Technical details

The vulnerability stems from an improper ownership transfer in the GRO feature where packets with fraglist might be segmented later in the network stack. In skbsegmentlist, skbs can be reused as-is, but their destructor was removed in skbgroreceivelist while retaining the reference to their socket, preventing them from being properly orphaned. This leads to a kernel BUG in skborphan when attempting to process these packets (Kernel Git).

Impact

When exploited, this vulnerability can trigger a kernel BUG at include/linux/skbuff.h:3131 during packet processing, specifically in the ip6rcvcore function. This can lead to system stability issues and potential denial of service conditions (Red Hat CVE).

Mitigation and workarounds

The issue has been fixed by modifying the ownership transfer process in both skbgroreceive and skbgroreceive_list functions. The fix involves removing both the destructor and the socket reference during packet processing. Red Hat has released security updates for affected versions of Red Hat Enterprise Linux (Red Hat Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management