CVE-2024-27010: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net/sched: Fix mirred deadlock on device recursion When the mirred action is used on a classful egress qdisc and a packet is mirrored or redirected to self we hit a qdisc lock deadlock. See trace below. [..... other info removed for brevity....] [ 82.890906] [ 82.890906] ============================================ [ 82.890906] WARNING: possible recursive locking detected [ 82.890906] 6.8.0-05205-g77fadd89fe2d-dirty #213 Tainted: G W [ 82.890906] -------------------------------------------- [ 82.890906] ping/418 is trying to acquire lock: [ 82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at: __dev_queue_xmit+0x1778/0x3550 [ 82.890906] [ 82.890906] but task is already holding lock: [ 82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at: __dev_queue_xmit+0x1778/0x3550 [ 82.890906] [ 82.890906] other info that might help us debug this: [ 82.890906] Possible unsafe locking scenario: [ 82.890906] [ 82.890906] CPU0 [ 82.890906] ---- [ 82.890906] lock(&sch->q.lock); [ 82.890906] lock(&sch->q.lock); [ 82.890906] [ 82.890906] *** DEADLOCK *** [ 82.890906] [..... other info removed for brevity....] Example setup (eth0->eth0) to recreate tc qdisc add dev eth0 root handle 1: htb default 30 tc filter add dev eth0 handle 1: protocol ip prio 2 matchall \ action mirred egress redirect dev eth0 Another example(eth0->eth1->eth0) to recreate tc qdisc add dev eth0 root handle 1: htb default 30 tc filter add dev eth0 handle 1: protocol ip prio 2 matchall \ action mirred egress redirect dev eth1 tc qdisc add dev eth1 root handle 1: htb default 30 tc filter add dev eth1 handle 1: protocol ip prio 2 matchall \ action mirred egress redirect dev eth0 We fix this by adding an owner field (CPU id) to struct Qdisc set after root qdisc is entered. When the softirq enters it a second time, if the qdisc owner is the same CPU, the packet is dropped to break the loop.
AI Analysis
Technical Summary
CVE-2024-27010 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically within the handling of the mirred (mirror/redirect) action on classful egress queuing disciplines (qdiscs). The issue arises when a packet is mirrored or redirected back to the same network device (self-recursion), causing a recursive locking scenario that leads to a deadlock. This deadlock occurs because the kernel attempts to acquire a lock on the qdisc's queue lock (sch->q.lock) while it is already held by the same task, resulting in a kernel-level lock contention and system hang or freeze in the network stack. The vulnerability can be reproduced by configuring traffic control (tc) filters that redirect or mirror packets from a device back onto itself or through a loop involving multiple devices (e.g., eth0 to eth1 and back to eth0). The root cause is the lack of a mechanism to detect and break recursive calls into the qdisc processing code. The fix implemented involves adding an owner field, which tracks the CPU ID that currently owns the qdisc processing context. If the softirq processing re-enters the qdisc on the same CPU, the packet is dropped to prevent the deadlock. This patch prevents the kernel from hanging due to recursive mirred actions, improving network stack stability and reliability.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions that utilize advanced traffic control features, such as mirroring or redirecting packets at the egress qdisc level. The deadlock can cause network outages or degraded performance due to kernel hangs, impacting critical infrastructure, data centers, cloud providers, and enterprises relying on Linux-based networking equipment or servers. Organizations using Linux for routing, firewalling, or traffic shaping in production environments may experience denial of service conditions, leading to operational disruptions. Although exploitation does not appear to require user interaction or authentication, it does require specific network configurations to trigger the deadlock, which may limit widespread exploitation. However, targeted attacks or misconfigurations could lead to network instability. The vulnerability does not directly expose data confidentiality or integrity but affects availability, which is critical for business continuity and service reliability.
Mitigation Recommendations
1. Immediate patching: Apply the latest Linux kernel updates that include the fix for CVE-2024-27010. Ensure all systems running traffic control features are updated to a kernel version containing the patch. 2. Configuration review: Audit and review traffic control (tc) configurations to identify and eliminate mirred actions that redirect or mirror packets back to the same device or form recursive loops. Avoid complex mirroring setups that could trigger this deadlock. 3. Monitoring and alerting: Implement monitoring on network devices and Linux hosts for kernel warnings related to recursive locking or qdisc deadlocks. Use kernel logs and system telemetry to detect early signs of this issue. 4. Network segmentation: Limit the use of advanced traffic control features to trusted network segments and administrators to reduce accidental misconfiguration risks. 5. Testing environments: Before deploying new traffic control rules in production, test them in isolated environments to detect potential deadlock scenarios. 6. Incident response readiness: Prepare response plans for network outages caused by kernel deadlocks, including fallback mechanisms and rapid patch deployment procedures.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-27010: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net/sched: Fix mirred deadlock on device recursion When the mirred action is used on a classful egress qdisc and a packet is mirrored or redirected to self we hit a qdisc lock deadlock. See trace below. [..... other info removed for brevity....] [ 82.890906] [ 82.890906] ============================================ [ 82.890906] WARNING: possible recursive locking detected [ 82.890906] 6.8.0-05205-g77fadd89fe2d-dirty #213 Tainted: G W [ 82.890906] -------------------------------------------- [ 82.890906] ping/418 is trying to acquire lock: [ 82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at: __dev_queue_xmit+0x1778/0x3550 [ 82.890906] [ 82.890906] but task is already holding lock: [ 82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at: __dev_queue_xmit+0x1778/0x3550 [ 82.890906] [ 82.890906] other info that might help us debug this: [ 82.890906] Possible unsafe locking scenario: [ 82.890906] [ 82.890906] CPU0 [ 82.890906] ---- [ 82.890906] lock(&sch->q.lock); [ 82.890906] lock(&sch->q.lock); [ 82.890906] [ 82.890906] *** DEADLOCK *** [ 82.890906] [..... other info removed for brevity....] Example setup (eth0->eth0) to recreate tc qdisc add dev eth0 root handle 1: htb default 30 tc filter add dev eth0 handle 1: protocol ip prio 2 matchall \ action mirred egress redirect dev eth0 Another example(eth0->eth1->eth0) to recreate tc qdisc add dev eth0 root handle 1: htb default 30 tc filter add dev eth0 handle 1: protocol ip prio 2 matchall \ action mirred egress redirect dev eth1 tc qdisc add dev eth1 root handle 1: htb default 30 tc filter add dev eth1 handle 1: protocol ip prio 2 matchall \ action mirred egress redirect dev eth0 We fix this by adding an owner field (CPU id) to struct Qdisc set after root qdisc is entered. When the softirq enters it a second time, if the qdisc owner is the same CPU, the packet is dropped to break the loop.
AI-Powered Analysis
Technical Analysis
CVE-2024-27010 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically within the handling of the mirred (mirror/redirect) action on classful egress queuing disciplines (qdiscs). The issue arises when a packet is mirrored or redirected back to the same network device (self-recursion), causing a recursive locking scenario that leads to a deadlock. This deadlock occurs because the kernel attempts to acquire a lock on the qdisc's queue lock (sch->q.lock) while it is already held by the same task, resulting in a kernel-level lock contention and system hang or freeze in the network stack. The vulnerability can be reproduced by configuring traffic control (tc) filters that redirect or mirror packets from a device back onto itself or through a loop involving multiple devices (e.g., eth0 to eth1 and back to eth0). The root cause is the lack of a mechanism to detect and break recursive calls into the qdisc processing code. The fix implemented involves adding an owner field, which tracks the CPU ID that currently owns the qdisc processing context. If the softirq processing re-enters the qdisc on the same CPU, the packet is dropped to prevent the deadlock. This patch prevents the kernel from hanging due to recursive mirred actions, improving network stack stability and reliability.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions that utilize advanced traffic control features, such as mirroring or redirecting packets at the egress qdisc level. The deadlock can cause network outages or degraded performance due to kernel hangs, impacting critical infrastructure, data centers, cloud providers, and enterprises relying on Linux-based networking equipment or servers. Organizations using Linux for routing, firewalling, or traffic shaping in production environments may experience denial of service conditions, leading to operational disruptions. Although exploitation does not appear to require user interaction or authentication, it does require specific network configurations to trigger the deadlock, which may limit widespread exploitation. However, targeted attacks or misconfigurations could lead to network instability. The vulnerability does not directly expose data confidentiality or integrity but affects availability, which is critical for business continuity and service reliability.
Mitigation Recommendations
1. Immediate patching: Apply the latest Linux kernel updates that include the fix for CVE-2024-27010. Ensure all systems running traffic control features are updated to a kernel version containing the patch. 2. Configuration review: Audit and review traffic control (tc) configurations to identify and eliminate mirred actions that redirect or mirror packets back to the same device or form recursive loops. Avoid complex mirroring setups that could trigger this deadlock. 3. Monitoring and alerting: Implement monitoring on network devices and Linux hosts for kernel warnings related to recursive locking or qdisc deadlocks. Use kernel logs and system telemetry to detect early signs of this issue. 4. Network segmentation: Limit the use of advanced traffic control features to trusted network segments and administrators to reduce accidental misconfiguration risks. 5. Testing environments: Before deploying new traffic control rules in production, test them in isolated environments to detect potential deadlock scenarios. 6. Incident response readiness: Prepare response plans for network outages caused by kernel deadlocks, including fallback mechanisms and rapid patch deployment procedures.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.208Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9829c4522896dcbe30c9
Added to database: 5/21/2025, 9:08:57 AM
Last enriched: 6/29/2025, 2:24:58 PM
Last updated: 7/28/2025, 6:34:26 AM
Views: 15
Related Threats
CVE-2025-8950: SQL Injection in Campcodes Online Recruitment Management System
MediumCVE-2025-27388: CWE-20 Improper Input Validation in OPPO OPPO HEALTH APP
HighCVE-2025-8949: Stack-based Buffer Overflow in D-Link DIR-825
HighCVE-2025-8948: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-8947: SQL Injection in projectworlds Visitor Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.