CVE-2024-49980: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: vrf: revert "vrf: Remove unnecessary RCU-bh critical section" This reverts commit 504fc6f4f7f681d2a03aa5f68aad549d90eab853. dev_queue_xmit_nit is expected to be called with BH disabled. __dev_queue_xmit has the following: /* Disable soft irqs for various locks below. Also * stops preemption for RCU. */ rcu_read_lock_bh(); VRF must follow this invariant. The referenced commit removed this protection. Which triggered a lockdep warning: ================================ WARNING: inconsistent lock state 6.11.0 #1 Tainted: G W -------------------------------- inconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W} usage. btserver/134819 [HC0[0]:SC0[0]:HE1:SE1] takes: ffff8882da30c118 (rlock-AF_PACKET){+.?.}-{2:2}, at: tpacket_rcv+0x863/0x3b30 {IN-SOFTIRQ-W} state was registered at: lock_acquire+0x19a/0x4f0 _raw_spin_lock+0x27/0x40 packet_rcv+0xa33/0x1320 __netif_receive_skb_core.constprop.0+0xcb0/0x3a90 __netif_receive_skb_list_core+0x2c9/0x890 netif_receive_skb_list_internal+0x610/0xcc0 [...] other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(rlock-AF_PACKET); <Interrupt> lock(rlock-AF_PACKET); *** DEADLOCK *** Call Trace: <TASK> dump_stack_lvl+0x73/0xa0 mark_lock+0x102e/0x16b0 __lock_acquire+0x9ae/0x6170 lock_acquire+0x19a/0x4f0 _raw_spin_lock+0x27/0x40 tpacket_rcv+0x863/0x3b30 dev_queue_xmit_nit+0x709/0xa40 vrf_finish_direct+0x26e/0x340 [vrf] vrf_l3_out+0x5f4/0xe80 [vrf] __ip_local_out+0x51e/0x7a0 [...]
AI Analysis
Technical Summary
CVE-2024-49980 is a vulnerability in the Linux kernel related to the Virtual Routing and Forwarding (VRF) subsystem. The issue arises from a reverted commit (504fc6f4f7f681d2a03aa5f68aad549d90eab853) that had removed an important Read-Copy-Update bottom-half (RCU-bh) critical section protection. Specifically, the function dev_queue_xmit_nit is expected to be called with bottom halves (BH) disabled to maintain proper locking invariants. The __dev_queue_xmit function disables soft interrupts and stops preemption for RCU by calling rcu_read_lock_bh(), and VRF code must respect this locking context. The reverted commit removed this protection, leading to inconsistent lock states and triggering lock dependency (lockdep) warnings. The vulnerability manifests as a potential deadlock scenario where the same lock (rlock-AF_PACKET) is acquired twice in conflicting contexts: once in a task context and once in a softirq (interrupt) context. This can cause kernel deadlocks, impacting system stability and availability. The detailed kernel call traces indicate that the deadlock occurs during packet reception and transmission paths involving VRF and AF_PACKET locks. Although no known exploits are reported in the wild, the vulnerability can cause system hangs or crashes under certain network traffic conditions, especially in environments using VRF for network segmentation or advanced routing. The vulnerability affects Linux kernel versions containing the reverted commit, and the fix involves restoring the RCU-bh critical section to maintain proper locking discipline and prevent deadlocks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected commit, particularly those utilizing VRF for network virtualization, segmentation, or multi-tenant routing. Enterprises in telecommunications, cloud service providers, data centers, and large enterprises with complex network topologies are at higher risk. The deadlock can lead to kernel hangs or crashes, resulting in denial of service (DoS) conditions. This can disrupt critical network services, impacting business continuity, especially in sectors like finance, healthcare, and critical infrastructure where Linux-based systems are prevalent. The vulnerability does not appear to allow privilege escalation or data leakage directly but can severely affect system availability and reliability. Given the widespread use of Linux in European IT infrastructure, the impact could be significant if unpatched systems are exposed to crafted network traffic triggering the deadlock. The absence of known exploits reduces immediate risk, but the potential for DoS in production environments necessitates prompt attention.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is fixed, ensuring the reverted commit is not present. Kernel updates should be applied following thorough testing in staging environments to confirm stability. Network administrators should audit systems using VRF and AF_PACKET interfaces to identify vulnerable kernels. In environments where immediate patching is not feasible, mitigating controls include limiting exposure of affected systems to untrusted or potentially malicious network traffic, especially traffic that could trigger complex packet processing paths. Monitoring kernel logs for lockdep warnings or unusual softirq behavior can provide early indicators of attempted exploitation or system instability. Additionally, organizations should implement robust system monitoring and automated recovery mechanisms to minimize downtime in case of kernel deadlocks. Coordination with Linux distribution vendors for timely patches and advisories is also recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-49980: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: vrf: revert "vrf: Remove unnecessary RCU-bh critical section" This reverts commit 504fc6f4f7f681d2a03aa5f68aad549d90eab853. dev_queue_xmit_nit is expected to be called with BH disabled. __dev_queue_xmit has the following: /* Disable soft irqs for various locks below. Also * stops preemption for RCU. */ rcu_read_lock_bh(); VRF must follow this invariant. The referenced commit removed this protection. Which triggered a lockdep warning: ================================ WARNING: inconsistent lock state 6.11.0 #1 Tainted: G W -------------------------------- inconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W} usage. btserver/134819 [HC0[0]:SC0[0]:HE1:SE1] takes: ffff8882da30c118 (rlock-AF_PACKET){+.?.}-{2:2}, at: tpacket_rcv+0x863/0x3b30 {IN-SOFTIRQ-W} state was registered at: lock_acquire+0x19a/0x4f0 _raw_spin_lock+0x27/0x40 packet_rcv+0xa33/0x1320 __netif_receive_skb_core.constprop.0+0xcb0/0x3a90 __netif_receive_skb_list_core+0x2c9/0x890 netif_receive_skb_list_internal+0x610/0xcc0 [...] other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(rlock-AF_PACKET); <Interrupt> lock(rlock-AF_PACKET); *** DEADLOCK *** Call Trace: <TASK> dump_stack_lvl+0x73/0xa0 mark_lock+0x102e/0x16b0 __lock_acquire+0x9ae/0x6170 lock_acquire+0x19a/0x4f0 _raw_spin_lock+0x27/0x40 tpacket_rcv+0x863/0x3b30 dev_queue_xmit_nit+0x709/0xa40 vrf_finish_direct+0x26e/0x340 [vrf] vrf_l3_out+0x5f4/0xe80 [vrf] __ip_local_out+0x51e/0x7a0 [...]
AI-Powered Analysis
Technical Analysis
CVE-2024-49980 is a vulnerability in the Linux kernel related to the Virtual Routing and Forwarding (VRF) subsystem. The issue arises from a reverted commit (504fc6f4f7f681d2a03aa5f68aad549d90eab853) that had removed an important Read-Copy-Update bottom-half (RCU-bh) critical section protection. Specifically, the function dev_queue_xmit_nit is expected to be called with bottom halves (BH) disabled to maintain proper locking invariants. The __dev_queue_xmit function disables soft interrupts and stops preemption for RCU by calling rcu_read_lock_bh(), and VRF code must respect this locking context. The reverted commit removed this protection, leading to inconsistent lock states and triggering lock dependency (lockdep) warnings. The vulnerability manifests as a potential deadlock scenario where the same lock (rlock-AF_PACKET) is acquired twice in conflicting contexts: once in a task context and once in a softirq (interrupt) context. This can cause kernel deadlocks, impacting system stability and availability. The detailed kernel call traces indicate that the deadlock occurs during packet reception and transmission paths involving VRF and AF_PACKET locks. Although no known exploits are reported in the wild, the vulnerability can cause system hangs or crashes under certain network traffic conditions, especially in environments using VRF for network segmentation or advanced routing. The vulnerability affects Linux kernel versions containing the reverted commit, and the fix involves restoring the RCU-bh critical section to maintain proper locking discipline and prevent deadlocks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected commit, particularly those utilizing VRF for network virtualization, segmentation, or multi-tenant routing. Enterprises in telecommunications, cloud service providers, data centers, and large enterprises with complex network topologies are at higher risk. The deadlock can lead to kernel hangs or crashes, resulting in denial of service (DoS) conditions. This can disrupt critical network services, impacting business continuity, especially in sectors like finance, healthcare, and critical infrastructure where Linux-based systems are prevalent. The vulnerability does not appear to allow privilege escalation or data leakage directly but can severely affect system availability and reliability. Given the widespread use of Linux in European IT infrastructure, the impact could be significant if unpatched systems are exposed to crafted network traffic triggering the deadlock. The absence of known exploits reduces immediate risk, but the potential for DoS in production environments necessitates prompt attention.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is fixed, ensuring the reverted commit is not present. Kernel updates should be applied following thorough testing in staging environments to confirm stability. Network administrators should audit systems using VRF and AF_PACKET interfaces to identify vulnerable kernels. In environments where immediate patching is not feasible, mitigating controls include limiting exposure of affected systems to untrusted or potentially malicious network traffic, especially traffic that could trigger complex packet processing paths. Monitoring kernel logs for lockdep warnings or unusual softirq behavior can provide early indicators of attempted exploitation or system instability. Additionally, organizations should implement robust system monitoring and automated recovery mechanisms to minimize downtime in case of kernel deadlocks. Coordination with Linux distribution vendors for timely patches and advisories is also recommended.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T12:17:06.052Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfbe4
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 3:54:43 PM
Last updated: 8/6/2025, 2:36:22 AM
Views: 16
Related Threats
CVE-2025-9007: Buffer Overflow in Tenda CH22
HighCVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.