Skip to main content

CVE-2024-47678: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-47678cvecve-2024-47678
Published: Mon Oct 21 2024 (10/21/2024, 11:53:21 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: icmp: change the order of rate limits ICMP messages are ratelimited : After the blamed commits, the two rate limiters are applied in this order: 1) host wide ratelimit (icmp_global_allow()) 2) Per destination ratelimit (inetpeer based) In order to avoid side-channels attacks, we need to apply the per destination check first. This patch makes the following change : 1) icmp_global_allow() checks if the host wide limit is reached. But credits are not yet consumed. This is deferred to 3) 2) The per destination limit is checked/updated. This might add a new node in inetpeer tree. 3) icmp_global_consume() consumes tokens if prior operations succeeded. This means that host wide ratelimit is still effective in keeping inetpeer tree small even under DDOS. As a bonus, I removed icmp_global.lock as the fast path can use a lock-free operation.

AI-Powered Analysis

AILast updated: 06/28/2025, 19:26:07 UTC

Technical Analysis

CVE-2024-47678 addresses a vulnerability in the Linux kernel's handling of ICMP (Internet Control Message Protocol) message rate limiting. ICMP messages are subject to rate limiting to prevent abuse such as denial-of-service (DoS) attacks. Prior to the patch, the Linux kernel applied two rate limiters in the following order: first a host-wide rate limit (icmp_global_allow()), followed by a per-destination rate limit based on the inetpeer data structure. This ordering could potentially allow side-channel attacks because the per-destination check was performed after the global check, which might leak information about the rate limiting state or allow attackers to manipulate the rate limiting behavior. The patch changes the order of these checks to first perform the per-destination rate limit check and update, which may involve adding a new node to the inetpeer tree, and only then consume tokens from the global rate limiter if the prior checks succeed. This approach ensures that the per-destination rate limiting is enforced before the global rate limiter consumes tokens, reducing the risk of side-channel attacks. Additionally, the patch removes the icmp_global.lock, enabling a lock-free fast path operation, which can improve performance under high load or DoS conditions. The vulnerability affects Linux kernel versions identified by the commit hash 4cdf507d54525842dfd9f6313fdafba039084046 and presumably related versions. No known exploits are currently reported in the wild. The vulnerability is primarily a logic flaw in the rate limiting mechanism that could be exploited to bypass or manipulate ICMP rate limits, potentially facilitating denial-of-service or reconnaissance attacks by abusing ICMP traffic. However, exploitation requires network-level access and the ability to send crafted ICMP packets.

Potential Impact

For European organizations, this vulnerability could have several impacts. Many European enterprises, governments, and service providers rely heavily on Linux-based systems for servers, network infrastructure, and cloud environments. If exploited, attackers could bypass ICMP rate limiting controls, enabling amplified or sustained ICMP flood attacks that degrade network availability or cause denial-of-service conditions. This could disrupt critical services, especially for organizations providing internet-facing infrastructure or those with stringent availability requirements. Furthermore, the side-channel aspect could potentially be leveraged for network reconnaissance or to infer internal rate limiting policies, aiding attackers in crafting more effective attacks. Although no active exploits are known, the widespread use of Linux in Europe means that unpatched systems remain at risk. The vulnerability could also be leveraged as part of multi-stage attacks targeting network infrastructure. The removal of locking mechanisms in the patch suggests that prior implementations might have performance bottlenecks under attack, so unpatched systems might be more vulnerable to DoS amplification. Overall, the impact is primarily on network availability and security posture, with potential indirect effects on confidentiality and integrity if attackers use ICMP abuse as a vector for further exploitation.

Mitigation Recommendations

European organizations should prioritize patching Linux kernel versions affected by CVE-2024-47678 as soon as vendor updates become available. Given the nature of the vulnerability, kernel updates that reorder the ICMP rate limiting checks and remove the global lock are essential. Network administrators should also implement additional network-level protections such as ingress and egress filtering to limit ICMP traffic to legitimate sources and destinations, reducing the attack surface. Deploying advanced intrusion detection and prevention systems (IDS/IPS) that can detect abnormal ICMP traffic patterns can help identify exploitation attempts early. Organizations should review firewall and router configurations to enforce strict rate limiting and filtering policies on ICMP traffic beyond the kernel-level controls. For critical infrastructure, consider segmenting networks to isolate systems that handle ICMP traffic heavily and monitor those segments closely. Additionally, logging and monitoring ICMP traffic trends can provide early warning signs of abuse. Since the vulnerability involves potential side-channel information leakage, organizations should also assess their network monitoring tools for any anomalies that might indicate reconnaissance activities. Finally, educating network and security teams about this vulnerability and its implications will help ensure rapid response and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-30T16:00:12.939Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe04b6

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 7:26:07 PM

Last updated: 7/30/2025, 11:10:01 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats