CVE-2024-35889

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35889
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35889.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35889
Downstream
Related
Published
2024-05-19T08:34:45Z
Modified
2025-10-21T20:51:07.671905Z
Summary
idpf: fix kernel panic on unknown packet types
Details

In the Linux kernel, the following vulnerability has been resolved:

idpf: fix kernel panic on unknown packet types

In the very rare case where a packet type is unknown to the driver, idpfrxprocessskbfields would return early without calling ethtypetrans to set the skb protocol / the network layer handler. This is especially problematic if tcpdump is running when such a packet is received, i.e. it would cause a kernel panic.

Instead, call ethtypetrans for every single packet, even when the packet type is unknown.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3a8845af66edb340ba9210bb8a0da040c7d6e590
Fixed
b4d28f7fa4dd531cf503a4fe1ca7008960cc5832
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3a8845af66edb340ba9210bb8a0da040c7d6e590
Fixed
dd19e827d63ac60debf117676d1126bff884bdb8

Affected versions

v6.*

v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.8.1
v6.8.2
v6.8.3
v6.8.4
v6.9-rc1

Database specific

vanir_signatures

[
    {
        "signature_type": "Function",
        "signature_version": "v1",
        "target": {
            "function": "idpf_rx_process_skb_fields",
            "file": "drivers/net/ethernet/intel/idpf/idpf_txrx.c"
        },
        "digest": {
            "function_hash": "310313329593927376429859671550716391099",
            "length": 649.0
        },
        "deprecated": false,
        "id": "CVE-2024-35889-05502bbe",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4d28f7fa4dd531cf503a4fe1ca7008960cc5832"
    },
    {
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "drivers/net/ethernet/intel/idpf/idpf_txrx.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "122138583901270092258323576527718906818",
                "287554405437925489517758859131355530953",
                "333412552738222554792135122249891958976",
                "221081764838500945554321210927918699124",
                "303271604752019572358391285982202247049",
                "240897614745425622331286808100761928101",
                "44729489744161260338185713708250275961"
            ]
        },
        "deprecated": false,
        "id": "CVE-2024-35889-0eb6f10d",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd19e827d63ac60debf117676d1126bff884bdb8"
    },
    {
        "signature_type": "Function",
        "signature_version": "v1",
        "target": {
            "function": "idpf_rx_process_skb_fields",
            "file": "drivers/net/ethernet/intel/idpf/idpf_txrx.c"
        },
        "digest": {
            "function_hash": "310313329593927376429859671550716391099",
            "length": 649.0
        },
        "deprecated": false,
        "id": "CVE-2024-35889-2956bac0",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd19e827d63ac60debf117676d1126bff884bdb8"
    },
    {
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "drivers/net/ethernet/intel/idpf/idpf_txrx.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "122138583901270092258323576527718906818",
                "287554405437925489517758859131355530953",
                "333412552738222554792135122249891958976",
                "221081764838500945554321210927918699124",
                "303271604752019572358391285982202247049",
                "240897614745425622331286808100761928101",
                "44729489744161260338185713708250275961"
            ]
        },
        "deprecated": false,
        "id": "CVE-2024-35889-85233e9d",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4d28f7fa4dd531cf503a4fe1ca7008960cc5832"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.8.5