Skip to main content

CVE-2024-36974: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-36974cvecve-2024-36974
Published: Tue Jun 18 2024 (06/18/2024, 19:15:07 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev->num_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.

AI-Powered Analysis

AILast updated: 06/29/2025, 10:54:58 UTC

Technical Analysis

CVE-2024-36974 is a vulnerability identified in the Linux kernel's network scheduler component, specifically within the taprio (Time-Aware Priority Scheduler) module. The issue arises from improper validation of the TCA_TAPRIO_ATTR_PRIOMAP attribute in the taprio_parse_mqprio_opt() function. When a user-space process makes the first call to taprio_change() with valid attributes, the kernel sets the device's number of traffic classes (dev->num_tc) to a non-zero value. However, on a subsequent call to taprio_change(), if arbitrary or malformed mqprio attributes are provided, the function returns early without proper validation. This lack of validation allows user-space to inject arbitrary data into the kernel. The consequence of this flaw is that it can lead to kernel memory corruption or other unpredictable behavior, potentially allowing privilege escalation or denial of service. The vulnerability affects multiple versions of the Linux kernel as indicated by the repeated commit hash references, and it was publicly disclosed on June 18, 2024. There are no known exploits in the wild at the time of disclosure, and no CVSS score has been assigned yet. The root cause is a logic flaw in the validation process of the traffic control attributes, which is critical for network traffic scheduling and prioritization in Linux systems.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those relying heavily on Linux-based infrastructure, including servers, network appliances, and embedded systems. Exploitation could allow a local attacker or a compromised user-space process to inject arbitrary data into kernel memory, potentially leading to privilege escalation, kernel crashes, or system instability. This could disrupt critical services, including telecommunications, cloud services, and industrial control systems that depend on precise network traffic management. The impact is heightened in environments where multi-tenant or containerized workloads run on Linux hosts, as an attacker could leverage this vulnerability to escape confinement or escalate privileges. Additionally, organizations in sectors such as finance, healthcare, and government, which require high availability and data integrity, could face operational disruptions and increased risk of data breaches if this vulnerability is exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should promptly apply the official Linux kernel patches once they become available from trusted sources such as the Linux kernel mailing list or their Linux distribution vendors. Until patches are applied, organizations should restrict access to systems running vulnerable kernel versions, especially limiting untrusted user-space processes from invoking network scheduler configuration changes. Employing strict access controls and monitoring for unusual network configuration changes can help detect exploitation attempts. Additionally, organizations should consider deploying kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), and enable security modules like SELinux or AppArmor to limit the impact of potential exploitation. Regularly updating and auditing network scheduler configurations and ensuring that only authorized administrators can modify traffic control settings will also reduce risk. Finally, integrating this vulnerability into vulnerability management and incident response plans will ensure timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-30T15:25:07.082Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe2855

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 10:54:58 AM

Last updated: 8/16/2025, 11:41:44 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats