Skip to main content

CVE-2024-27010: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-27010cvecve-2024-27010
Published: Wed May 01 2024 (05/01/2024, 05:29:23 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/sched: Fix mirred deadlock on device recursion When the mirred action is used on a classful egress qdisc and a packet is mirrored or redirected to self we hit a qdisc lock deadlock. See trace below. [..... other info removed for brevity....] [ 82.890906] [ 82.890906] ============================================ [ 82.890906] WARNING: possible recursive locking detected [ 82.890906] 6.8.0-05205-g77fadd89fe2d-dirty #213 Tainted: G W [ 82.890906] -------------------------------------------- [ 82.890906] ping/418 is trying to acquire lock: [ 82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at: __dev_queue_xmit+0x1778/0x3550 [ 82.890906] [ 82.890906] but task is already holding lock: [ 82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at: __dev_queue_xmit+0x1778/0x3550 [ 82.890906] [ 82.890906] other info that might help us debug this: [ 82.890906] Possible unsafe locking scenario: [ 82.890906] [ 82.890906] CPU0 [ 82.890906] ---- [ 82.890906] lock(&sch->q.lock); [ 82.890906] lock(&sch->q.lock); [ 82.890906] [ 82.890906] *** DEADLOCK *** [ 82.890906] [..... other info removed for brevity....] Example setup (eth0->eth0) to recreate tc qdisc add dev eth0 root handle 1: htb default 30 tc filter add dev eth0 handle 1: protocol ip prio 2 matchall \ action mirred egress redirect dev eth0 Another example(eth0->eth1->eth0) to recreate tc qdisc add dev eth0 root handle 1: htb default 30 tc filter add dev eth0 handle 1: protocol ip prio 2 matchall \ action mirred egress redirect dev eth1 tc qdisc add dev eth1 root handle 1: htb default 30 tc filter add dev eth1 handle 1: protocol ip prio 2 matchall \ action mirred egress redirect dev eth0 We fix this by adding an owner field (CPU id) to struct Qdisc set after root qdisc is entered. When the softirq enters it a second time, if the qdisc owner is the same CPU, the packet is dropped to break the loop.

AI-Powered Analysis

AILast updated: 06/29/2025, 14:24:58 UTC

Technical Analysis

CVE-2024-27010 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically within the handling of the mirred (mirror/redirect) action on classful egress queuing disciplines (qdiscs). The issue arises when a packet is mirrored or redirected back to the same network device (self-recursion), causing a recursive locking scenario that leads to a deadlock. This deadlock occurs because the kernel attempts to acquire a lock on the qdisc's queue lock (sch->q.lock) while it is already held by the same task, resulting in a kernel-level lock contention and system hang or freeze in the network stack. The vulnerability can be reproduced by configuring traffic control (tc) filters that redirect or mirror packets from a device back onto itself or through a loop involving multiple devices (e.g., eth0 to eth1 and back to eth0). The root cause is the lack of a mechanism to detect and break recursive calls into the qdisc processing code. The fix implemented involves adding an owner field, which tracks the CPU ID that currently owns the qdisc processing context. If the softirq processing re-enters the qdisc on the same CPU, the packet is dropped to prevent the deadlock. This patch prevents the kernel from hanging due to recursive mirred actions, improving network stack stability and reliability.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions that utilize advanced traffic control features, such as mirroring or redirecting packets at the egress qdisc level. The deadlock can cause network outages or degraded performance due to kernel hangs, impacting critical infrastructure, data centers, cloud providers, and enterprises relying on Linux-based networking equipment or servers. Organizations using Linux for routing, firewalling, or traffic shaping in production environments may experience denial of service conditions, leading to operational disruptions. Although exploitation does not appear to require user interaction or authentication, it does require specific network configurations to trigger the deadlock, which may limit widespread exploitation. However, targeted attacks or misconfigurations could lead to network instability. The vulnerability does not directly expose data confidentiality or integrity but affects availability, which is critical for business continuity and service reliability.

Mitigation Recommendations

1. Immediate patching: Apply the latest Linux kernel updates that include the fix for CVE-2024-27010. Ensure all systems running traffic control features are updated to a kernel version containing the patch. 2. Configuration review: Audit and review traffic control (tc) configurations to identify and eliminate mirred actions that redirect or mirror packets back to the same device or form recursive loops. Avoid complex mirroring setups that could trigger this deadlock. 3. Monitoring and alerting: Implement monitoring on network devices and Linux hosts for kernel warnings related to recursive locking or qdisc deadlocks. Use kernel logs and system telemetry to detect early signs of this issue. 4. Network segmentation: Limit the use of advanced traffic control features to trusted network segments and administrators to reduce accidental misconfiguration risks. 5. Testing environments: Before deploying new traffic control rules in production, test them in isolated environments to detect potential deadlock scenarios. 6. Incident response readiness: Prepare response plans for network outages caused by kernel deadlocks, including fallback mechanisms and rapid patch deployment procedures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.208Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe30c9

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 2:24:58 PM

Last updated: 7/28/2025, 6:34:26 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats