Skip to main content

CVE-2024-49980: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-49980cvecve-2024-49980
Published: Mon Oct 21 2024 (10/21/2024, 18:02:26 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: vrf: revert "vrf: Remove unnecessary RCU-bh critical section" This reverts commit 504fc6f4f7f681d2a03aa5f68aad549d90eab853. dev_queue_xmit_nit is expected to be called with BH disabled. __dev_queue_xmit has the following: /* Disable soft irqs for various locks below. Also * stops preemption for RCU. */ rcu_read_lock_bh(); VRF must follow this invariant. The referenced commit removed this protection. Which triggered a lockdep warning: ================================ WARNING: inconsistent lock state 6.11.0 #1 Tainted: G W -------------------------------- inconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W} usage. btserver/134819 [HC0[0]:SC0[0]:HE1:SE1] takes: ffff8882da30c118 (rlock-AF_PACKET){+.?.}-{2:2}, at: tpacket_rcv+0x863/0x3b30 {IN-SOFTIRQ-W} state was registered at: lock_acquire+0x19a/0x4f0 _raw_spin_lock+0x27/0x40 packet_rcv+0xa33/0x1320 __netif_receive_skb_core.constprop.0+0xcb0/0x3a90 __netif_receive_skb_list_core+0x2c9/0x890 netif_receive_skb_list_internal+0x610/0xcc0 [...] other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(rlock-AF_PACKET); <Interrupt> lock(rlock-AF_PACKET); *** DEADLOCK *** Call Trace: <TASK> dump_stack_lvl+0x73/0xa0 mark_lock+0x102e/0x16b0 __lock_acquire+0x9ae/0x6170 lock_acquire+0x19a/0x4f0 _raw_spin_lock+0x27/0x40 tpacket_rcv+0x863/0x3b30 dev_queue_xmit_nit+0x709/0xa40 vrf_finish_direct+0x26e/0x340 [vrf] vrf_l3_out+0x5f4/0xe80 [vrf] __ip_local_out+0x51e/0x7a0 [...]

AI-Powered Analysis

AILast updated: 06/28/2025, 15:54:43 UTC

Technical Analysis

CVE-2024-49980 is a vulnerability in the Linux kernel related to the Virtual Routing and Forwarding (VRF) subsystem. The issue arises from a reverted commit (504fc6f4f7f681d2a03aa5f68aad549d90eab853) that had removed an important Read-Copy-Update bottom-half (RCU-bh) critical section protection. Specifically, the function dev_queue_xmit_nit is expected to be called with bottom halves (BH) disabled to maintain proper locking invariants. The __dev_queue_xmit function disables soft interrupts and stops preemption for RCU by calling rcu_read_lock_bh(), and VRF code must respect this locking context. The reverted commit removed this protection, leading to inconsistent lock states and triggering lock dependency (lockdep) warnings. The vulnerability manifests as a potential deadlock scenario where the same lock (rlock-AF_PACKET) is acquired twice in conflicting contexts: once in a task context and once in a softirq (interrupt) context. This can cause kernel deadlocks, impacting system stability and availability. The detailed kernel call traces indicate that the deadlock occurs during packet reception and transmission paths involving VRF and AF_PACKET locks. Although no known exploits are reported in the wild, the vulnerability can cause system hangs or crashes under certain network traffic conditions, especially in environments using VRF for network segmentation or advanced routing. The vulnerability affects Linux kernel versions containing the reverted commit, and the fix involves restoring the RCU-bh critical section to maintain proper locking discipline and prevent deadlocks.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected commit, particularly those utilizing VRF for network virtualization, segmentation, or multi-tenant routing. Enterprises in telecommunications, cloud service providers, data centers, and large enterprises with complex network topologies are at higher risk. The deadlock can lead to kernel hangs or crashes, resulting in denial of service (DoS) conditions. This can disrupt critical network services, impacting business continuity, especially in sectors like finance, healthcare, and critical infrastructure where Linux-based systems are prevalent. The vulnerability does not appear to allow privilege escalation or data leakage directly but can severely affect system availability and reliability. Given the widespread use of Linux in European IT infrastructure, the impact could be significant if unpatched systems are exposed to crafted network traffic triggering the deadlock. The absence of known exploits reduces immediate risk, but the potential for DoS in production environments necessitates prompt attention.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is fixed, ensuring the reverted commit is not present. Kernel updates should be applied following thorough testing in staging environments to confirm stability. Network administrators should audit systems using VRF and AF_PACKET interfaces to identify vulnerable kernels. In environments where immediate patching is not feasible, mitigating controls include limiting exposure of affected systems to untrusted or potentially malicious network traffic, especially traffic that could trigger complex packet processing paths. Monitoring kernel logs for lockdep warnings or unusual softirq behavior can provide early indicators of attempted exploitation or system instability. Additionally, organizations should implement robust system monitoring and automated recovery mechanisms to minimize downtime in case of kernel deadlocks. Coordination with Linux distribution vendors for timely patches and advisories is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.052Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfbe4

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 3:54:43 PM

Last updated: 8/6/2025, 2:36:22 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats