CVE-2024-40995: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() syzbot found hanging tasks waiting on rtnl_lock [1] A reproducer is available in the syzbot bug. When a request to add multiple actions with the same index is sent, the second request will block forever on the first request. This holds rtnl_lock, and causes tasks to hang. Return -EAGAIN to prevent infinite looping, while keeping documented behavior. [1] INFO: task kworker/1:0:5088 blocked for more than 143 seconds. Not tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000 Workqueue: events_power_efficient reg_check_chans_work Call Trace: <TASK> context_switch kernel/sched/core.c:5409 [inline] __schedule+0xf15/0x5d00 kernel/sched/core.c:6746 __schedule_loop kernel/sched/core.c:6823 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6838 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895 __mutex_lock_common kernel/locking/mutex.c:684 [inline] __mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752 wiphy_lock include/net/cfg80211.h:5953 [inline] reg_leave_invalid_chans net/wireless/reg.c:2466 [inline] reg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481
AI Analysis
Technical Summary
CVE-2024-40995 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically within the act_api component responsible for managing traffic control actions. The flaw arises in the function tcf_idr_check_alloc(), which is involved in allocating identifiers for traffic control actions. When multiple requests attempt to add actions with the same index concurrently, the second request blocks indefinitely waiting on the first, causing a deadlock. This deadlock occurs because the second request holds the rtnl_lock (the kernel's routing netlink lock) while waiting, which prevents other tasks from proceeding and leads to tasks hanging indefinitely. The issue was discovered by syzbot, an automated kernel fuzzer, which observed tasks blocked on rtnl_lock for extended periods (e.g., over 143 seconds). The root cause is an infinite loop or blocking condition when handling duplicate action indices without proper error handling. The fix involves returning the error code -EAGAIN to signal the caller to retry, thereby preventing infinite looping while maintaining the documented behavior of the API. This vulnerability can cause kernel-level hangs or denial of service (DoS) conditions due to blocked kernel worker threads, impacting system stability and availability. The vulnerability affects Linux kernel versions prior to the patch and is relevant to any system using the affected kernel versions with traffic control features enabled. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-40995 is a potential denial of service condition at the kernel level, which can cause system instability or unresponsiveness. This is particularly critical for infrastructure relying on Linux servers for networking, routing, or traffic shaping, such as ISPs, cloud providers, telecom operators, and enterprises with complex network management needs. Systems that heavily utilize Linux traffic control features or custom network configurations are at higher risk. The hang caused by the vulnerability can disrupt critical services, leading to downtime and potential operational losses. Additionally, if exploited in multi-tenant environments or cloud infrastructures, it could affect multiple customers or services simultaneously. While this vulnerability does not directly lead to privilege escalation or data leakage, the availability impact can indirectly affect confidentiality and integrity by disrupting security monitoring, patching, or incident response activities. European organizations with stringent uptime requirements or those operating critical infrastructure should prioritize addressing this issue to maintain service continuity.
Mitigation Recommendations
To mitigate CVE-2024-40995, organizations should promptly apply the official Linux kernel patches that address the infinite loop and blocking condition in tcf_idr_check_alloc(). Since the fix involves returning -EAGAIN to avoid deadlocks, updating to a patched kernel version is the most effective measure. For environments where immediate patching is not feasible, consider temporarily disabling or limiting the use of traffic control actions that add multiple actions with the same index to reduce the risk of triggering the vulnerability. Monitoring kernel logs for hung tasks or blocked rtnl_lock messages can help detect attempts to exploit or encounter this issue. Implementing kernel live patching solutions, where supported, can reduce downtime associated with patch deployment. Additionally, network administrators should review and audit traffic control configurations to ensure they do not inadvertently create conditions that could trigger the vulnerability. Finally, maintain robust incident response and system monitoring capabilities to quickly identify and remediate any system hangs or performance degradation potentially linked to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-40995: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() syzbot found hanging tasks waiting on rtnl_lock [1] A reproducer is available in the syzbot bug. When a request to add multiple actions with the same index is sent, the second request will block forever on the first request. This holds rtnl_lock, and causes tasks to hang. Return -EAGAIN to prevent infinite looping, while keeping documented behavior. [1] INFO: task kworker/1:0:5088 blocked for more than 143 seconds. Not tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000 Workqueue: events_power_efficient reg_check_chans_work Call Trace: <TASK> context_switch kernel/sched/core.c:5409 [inline] __schedule+0xf15/0x5d00 kernel/sched/core.c:6746 __schedule_loop kernel/sched/core.c:6823 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6838 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895 __mutex_lock_common kernel/locking/mutex.c:684 [inline] __mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752 wiphy_lock include/net/cfg80211.h:5953 [inline] reg_leave_invalid_chans net/wireless/reg.c:2466 [inline] reg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481
AI-Powered Analysis
Technical Analysis
CVE-2024-40995 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically within the act_api component responsible for managing traffic control actions. The flaw arises in the function tcf_idr_check_alloc(), which is involved in allocating identifiers for traffic control actions. When multiple requests attempt to add actions with the same index concurrently, the second request blocks indefinitely waiting on the first, causing a deadlock. This deadlock occurs because the second request holds the rtnl_lock (the kernel's routing netlink lock) while waiting, which prevents other tasks from proceeding and leads to tasks hanging indefinitely. The issue was discovered by syzbot, an automated kernel fuzzer, which observed tasks blocked on rtnl_lock for extended periods (e.g., over 143 seconds). The root cause is an infinite loop or blocking condition when handling duplicate action indices without proper error handling. The fix involves returning the error code -EAGAIN to signal the caller to retry, thereby preventing infinite looping while maintaining the documented behavior of the API. This vulnerability can cause kernel-level hangs or denial of service (DoS) conditions due to blocked kernel worker threads, impacting system stability and availability. The vulnerability affects Linux kernel versions prior to the patch and is relevant to any system using the affected kernel versions with traffic control features enabled. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-40995 is a potential denial of service condition at the kernel level, which can cause system instability or unresponsiveness. This is particularly critical for infrastructure relying on Linux servers for networking, routing, or traffic shaping, such as ISPs, cloud providers, telecom operators, and enterprises with complex network management needs. Systems that heavily utilize Linux traffic control features or custom network configurations are at higher risk. The hang caused by the vulnerability can disrupt critical services, leading to downtime and potential operational losses. Additionally, if exploited in multi-tenant environments or cloud infrastructures, it could affect multiple customers or services simultaneously. While this vulnerability does not directly lead to privilege escalation or data leakage, the availability impact can indirectly affect confidentiality and integrity by disrupting security monitoring, patching, or incident response activities. European organizations with stringent uptime requirements or those operating critical infrastructure should prioritize addressing this issue to maintain service continuity.
Mitigation Recommendations
To mitigate CVE-2024-40995, organizations should promptly apply the official Linux kernel patches that address the infinite loop and blocking condition in tcf_idr_check_alloc(). Since the fix involves returning -EAGAIN to avoid deadlocks, updating to a patched kernel version is the most effective measure. For environments where immediate patching is not feasible, consider temporarily disabling or limiting the use of traffic control actions that add multiple actions with the same index to reduce the risk of triggering the vulnerability. Monitoring kernel logs for hung tasks or blocked rtnl_lock messages can help detect attempts to exploit or encounter this issue. Implementing kernel live patching solutions, where supported, can reduce downtime associated with patch deployment. Additionally, network administrators should review and audit traffic control configurations to ensure they do not inadvertently create conditions that could trigger the vulnerability. Finally, maintain robust incident response and system monitoring capabilities to quickly identify and remediate any system hangs or performance degradation potentially linked to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-07-12T12:17:45.607Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9827c4522896dcbe15f3
Added to database: 5/21/2025, 9:08:55 AM
Last enriched: 6/29/2025, 3:11:33 AM
Last updated: 7/28/2025, 8:06:18 PM
Views: 15
Related Threats
CVE-2025-36613: CWE-266: Incorrect Privilege Assignment in Dell SupportAssist for Home PCs
LowCVE-2025-27845: n/a
UnknownCVE-2025-7972: CWE-286: Incorrect User Management in Rockwell Automation FactoryTalk® Linx
HighCVE-2025-8876: CWE-20 Improper Input Validation in N-able N-central
CriticalCVE-2025-8875: CWE-502 Deserialization of Untrusted Data in N-able N-central
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.