Skip to main content

CVE-2024-47734: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-47734cvecve-2024-47734
Published: Mon Oct 21 2024 (10/21/2024, 12:14:05 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave() syzbot reported a WARNING in bond_xdp_get_xmit_slave. To reproduce this[1], one bond device (bond1) has xdpdrv, which increases bpf_master_redirect_enabled_key. Another bond device (bond0) which is unsupported by XDP but its slave (veth3) has xdpgeneric that returns XDP_TX. This triggers WARN_ON_ONCE() from the xdp_master_redirect(). To reduce unnecessary warnings and improve log management, we need to delete the WARN_ON_ONCE() and add ratelimit to the netdev_err(). [1] Steps to reproduce: # Needs tx_xdp with return XDP_TX; ip l add veth0 type veth peer veth1 ip l add veth3 type veth peer veth4 ip l add bond0 type bond mode 6 # BOND_MODE_ALB, unsupported by XDP ip l add bond1 type bond # BOND_MODE_ROUNDROBIN by default ip l set veth0 master bond1 ip l set bond1 up # Increases bpf_master_redirect_enabled_key ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx ip l set veth3 master bond0 ip l set bond0 up ip l set veth4 up # Triggers WARN_ON_ONCE() from the xdp_master_redirect() ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx

AI-Powered Analysis

AILast updated: 06/28/2025, 20:11:26 UTC

Technical Analysis

CVE-2024-47734 addresses a vulnerability in the Linux kernel related to the bonding network driver, specifically in the function bond_xdp_get_xmit_slave(). The issue arises when multiple bonded network devices are configured with different XDP (eXpress Data Path) modes. In the described scenario, one bond device (bond1) uses the xdpdrv mode, which increases the bpf_master_redirect_enabled_key, while another bond device (bond0), which does not support XDP, has a slave interface (veth3) using the xdpgeneric mode that returns XDP_TX. This combination triggers a WARN_ON_ONCE() kernel warning inside the xdp_master_redirect() function. The warning is unnecessary and can flood kernel logs, potentially obscuring other important messages and complicating troubleshooting or monitoring efforts. The fix involves removing the WARN_ON_ONCE() call and adding rate limiting to the netdev_err() logging to reduce excessive warnings and improve log management. The vulnerability does not appear to be exploitable for privilege escalation or remote code execution but affects system stability and log clarity when specific bonding and XDP configurations are used. The issue was reported by syzbot, a kernel fuzzing tool, and is reproducible with specific network interface and bonding configurations involving veth pairs and bond modes such as BOND_MODE_ALB and BOND_MODE_ROUNDROBIN. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the primary impact of CVE-2024-47734 is related to operational stability and network monitoring reliability rather than direct security compromise. Organizations that deploy Linux servers with advanced network bonding configurations and utilize XDP for high-performance packet processing may experience excessive kernel warnings and log flooding. This can lead to increased difficulty in identifying genuine security incidents or system faults, potentially delaying response times. In environments such as data centers, cloud providers, and telecom infrastructure—where Linux bonding and XDP are leveraged for network throughput and redundancy—this could affect service reliability and increase administrative overhead. However, since the vulnerability does not enable privilege escalation or remote code execution, the confidentiality and integrity of data are not directly threatened. The availability impact is limited to potential disruptions caused by log flooding and the associated administrative burden. Organizations with less complex network setups or those not using bonding with XDP modes are unlikely to be affected.

Mitigation Recommendations

To mitigate the effects of CVE-2024-47734, European organizations should: 1) Apply the latest Linux kernel updates that include the patch removing the WARN_ON_ONCE() and adding rate limiting to netdev_err() in the bonding driver. 2) Review network bonding configurations to identify if multiple bond devices with differing XDP modes are in use, especially combinations involving bond modes unsupported by XDP and slaves using xdpgeneric mode. 3) Temporarily disable or avoid using conflicting XDP modes on bonded interfaces until patches are applied. 4) Enhance monitoring of kernel logs to filter or rate-limit warnings related to bond_xdp_get_xmit_slave() to prevent log flooding. 5) Incorporate this vulnerability into incident response and change management processes to ensure timely patching and configuration reviews. 6) For critical network infrastructure, conduct controlled testing of bonding and XDP configurations in staging environments to detect similar warnings before deployment. These steps go beyond generic advice by focusing on configuration auditing and log management specific to the bonding and XDP interaction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-30T16:00:12.958Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe0648

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 8:11:26 PM

Last updated: 8/2/2025, 6:13:52 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats