Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0641: Deadlock

0
Medium
VulnerabilityCVE-2024-0641cvecve-2024-0641
Published: Wed Jan 17 2024 (01/17/2024, 15:15:45 UTC)
Source: CVE Database V5

Description

A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel’s TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:06:47 UTC

Technical Analysis

CVE-2024-0641 identifies a denial of service (DoS) vulnerability within the Linux kernel's Transparent Inter-Process Communication (TIPC) subsystem, specifically in the tipc_crypto_key_revoke function located in net/tipc/crypto.c. The flaw arises from a deadlock condition that can be triggered by a local user with standard privileges, causing the kernel to hang or crash. TIPC is a protocol designed for efficient communication within clustered environments, often used in telecom and industrial systems. The vulnerability does not affect confidentiality or integrity but impacts availability by causing a system-wide denial of service. The CVSS v3.1 score of 5.5 reflects a medium severity due to the requirement of local access and the absence of privilege escalation or remote exploitation. No user interaction is needed, and the scope is limited to systems with TIPC enabled. Although no known exploits have been reported in the wild, the vulnerability poses a risk to environments where TIPC is actively used, potentially disrupting critical services. The lack of available patches at the time of reporting necessitates close monitoring and prompt application of fixes once released.

Potential Impact

The primary impact of CVE-2024-0641 is the potential for denial of service on affected Linux systems, which can lead to system crashes or hangs. This disruption can affect availability of services relying on the TIPC subsystem, particularly in clustered or telecom environments where TIPC is commonly deployed. Organizations operating critical infrastructure, telecommunications equipment, or industrial control systems using Linux with TIPC enabled may experience service outages, operational delays, or require system reboots to recover. Since exploitation requires only local user privileges, insider threats or compromised user accounts could trigger the vulnerability. However, the lack of confidentiality or integrity impact limits the risk to data breaches or unauthorized data modification. The absence of remote exploitability reduces the attack surface but does not eliminate risk in multi-user or shared environments.

Mitigation Recommendations

To mitigate CVE-2024-0641, organizations should first verify whether their Linux systems have the TIPC subsystem enabled and in use. If TIPC is not required, disabling the subsystem can eliminate exposure. For systems that require TIPC, monitoring vendor advisories for patches or kernel updates addressing this vulnerability is critical. Applying kernel updates promptly once available will resolve the deadlock issue. In the interim, restrict local user access to trusted personnel only and implement strict access controls to minimize the risk of exploitation by unprivileged users. Employ system monitoring tools to detect unusual system hangs or crashes potentially related to this vulnerability. Additionally, consider isolating critical systems running TIPC to reduce the risk of insider threats. Regularly audit user privileges and maintain robust endpoint security to prevent unauthorized local access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-01-17T09:52:20.542Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f5c4ee672cd9080e8d48b

Added to database: 11/20/2025, 6:22:06 PM

Last enriched: 2/28/2026, 11:06:47 AM

Last updated: 3/24/2026, 2:26:31 PM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses