CVE-2024-53047: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mptcp: init: protect sched with rcu_read_lock Enabling CONFIG_PROVE_RCU_LIST with its dependence CONFIG_RCU_EXPERT creates this splat when an MPTCP socket is created: ============================= WARNING: suspicious RCU usage 6.12.0-rc2+ #11 Not tainted ----------------------------- net/mptcp/sched.c:44 RCU-list traversed in non-reader section!! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 no locks held by mptcp_connect/176. stack backtrace: CPU: 0 UID: 0 PID: 176 Comm: mptcp_connect Not tainted 6.12.0-rc2+ #11 Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:123) lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) mptcp_sched_find (net/mptcp/sched.c:44 (discriminator 7)) mptcp_init_sock (net/mptcp/protocol.c:2867 (discriminator 1)) ? sock_init_data_uid (arch/x86/include/asm/atomic.h:28) inet_create.part.0.constprop.0 (net/ipv4/af_inet.c:386) ? __sock_create (include/linux/rcupdate.h:347 (discriminator 1)) __sock_create (net/socket.c:1576) __sys_socket (net/socket.c:1671) ? __pfx___sys_socket (net/socket.c:1712) ? do_user_addr_fault (arch/x86/mm/fault.c:1419 (discriminator 1)) __x64_sys_socket (net/socket.c:1728) do_syscall_64 (arch/x86/entry/common.c:52 (discriminator 1)) entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) That's because when the socket is initialised, rcu_read_lock() is not used despite the explicit comment written above the declaration of mptcp_sched_find() in sched.c. Adding the missing lock/unlock avoids the warning.
AI Analysis
Technical Summary
CVE-2024-53047 is a vulnerability identified in the Linux kernel's implementation of Multipath TCP (MPTCP), specifically within the scheduling component of the MPTCP subsystem. The issue arises due to improper use of Read-Copy-Update (RCU) synchronization primitives. When the kernel is compiled with CONFIG_PROVE_RCU_LIST and its dependency CONFIG_RCU_EXPERT enabled, creating an MPTCP socket triggers a kernel warning indicating suspicious RCU usage. The root cause is that the function mptcp_sched_find() traverses an RCU-protected list without holding the necessary rcu_read_lock(), violating RCU usage rules. This leads to a kernel warning (splat) and potential instability. The problem occurs during socket initialization in the mptcp_init_sock() function, where the missing rcu_read_lock()/rcu_read_unlock() calls cause the kernel's lock dependency checker to flag an error. Although this vulnerability does not appear to have an associated CVSS score or known exploits in the wild, it represents a kernel-level synchronization bug that could lead to kernel crashes or undefined behavior when MPTCP sockets are created under specific kernel configurations. The fix involves adding the missing RCU read-side critical section locks around the list traversal to ensure proper synchronization and prevent the warning and potential instability.
Potential Impact
For European organizations, the impact of CVE-2024-53047 primarily concerns systems running Linux kernels with MPTCP enabled and compiled with the debugging options CONFIG_PROVE_RCU_LIST and CONFIG_RCU_EXPERT. While these kernel options are typically used in development or debugging environments rather than production, any deployment of such kernels in critical infrastructure, cloud services, or enterprise servers could experience kernel panics or instability when MPTCP sockets are created. This could lead to denial of service conditions affecting network connectivity or application availability. Given the Linux kernel's widespread use across European governments, enterprises, and cloud providers, any instability at the kernel level can have cascading effects on service reliability. However, since the vulnerability requires specific kernel configurations and no known exploits exist, the immediate risk is limited. Nonetheless, organizations using MPTCP for advanced networking or load balancing should be aware of this issue and apply patches promptly to maintain kernel stability and avoid potential disruptions.
Mitigation Recommendations
1. Apply the official Linux kernel patches that add the missing rcu_read_lock()/rcu_read_unlock() calls in the MPTCP scheduler code to ensure proper RCU synchronization. 2. Review kernel build configurations and avoid enabling CONFIG_PROVE_RCU_LIST and CONFIG_RCU_EXPERT in production environments unless necessary for debugging, as these options increase sensitivity to RCU misuse. 3. For environments requiring MPTCP, validate kernel stability by testing socket creation and network operations under the patched kernel before deployment. 4. Monitor kernel logs for RCU warnings or splats related to MPTCP to detect any residual issues. 5. Coordinate with Linux distribution maintainers to ensure timely distribution of patched kernel packages. 6. If custom kernels are used, integrate the fix from the upstream Linux kernel source to prevent this vulnerability. 7. Implement robust kernel crash recovery and monitoring mechanisms to minimize downtime in case of unexpected kernel faults.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-53047: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mptcp: init: protect sched with rcu_read_lock Enabling CONFIG_PROVE_RCU_LIST with its dependence CONFIG_RCU_EXPERT creates this splat when an MPTCP socket is created: ============================= WARNING: suspicious RCU usage 6.12.0-rc2+ #11 Not tainted ----------------------------- net/mptcp/sched.c:44 RCU-list traversed in non-reader section!! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 no locks held by mptcp_connect/176. stack backtrace: CPU: 0 UID: 0 PID: 176 Comm: mptcp_connect Not tainted 6.12.0-rc2+ #11 Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:123) lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) mptcp_sched_find (net/mptcp/sched.c:44 (discriminator 7)) mptcp_init_sock (net/mptcp/protocol.c:2867 (discriminator 1)) ? sock_init_data_uid (arch/x86/include/asm/atomic.h:28) inet_create.part.0.constprop.0 (net/ipv4/af_inet.c:386) ? __sock_create (include/linux/rcupdate.h:347 (discriminator 1)) __sock_create (net/socket.c:1576) __sys_socket (net/socket.c:1671) ? __pfx___sys_socket (net/socket.c:1712) ? do_user_addr_fault (arch/x86/mm/fault.c:1419 (discriminator 1)) __x64_sys_socket (net/socket.c:1728) do_syscall_64 (arch/x86/entry/common.c:52 (discriminator 1)) entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) That's because when the socket is initialised, rcu_read_lock() is not used despite the explicit comment written above the declaration of mptcp_sched_find() in sched.c. Adding the missing lock/unlock avoids the warning.
AI-Powered Analysis
Technical Analysis
CVE-2024-53047 is a vulnerability identified in the Linux kernel's implementation of Multipath TCP (MPTCP), specifically within the scheduling component of the MPTCP subsystem. The issue arises due to improper use of Read-Copy-Update (RCU) synchronization primitives. When the kernel is compiled with CONFIG_PROVE_RCU_LIST and its dependency CONFIG_RCU_EXPERT enabled, creating an MPTCP socket triggers a kernel warning indicating suspicious RCU usage. The root cause is that the function mptcp_sched_find() traverses an RCU-protected list without holding the necessary rcu_read_lock(), violating RCU usage rules. This leads to a kernel warning (splat) and potential instability. The problem occurs during socket initialization in the mptcp_init_sock() function, where the missing rcu_read_lock()/rcu_read_unlock() calls cause the kernel's lock dependency checker to flag an error. Although this vulnerability does not appear to have an associated CVSS score or known exploits in the wild, it represents a kernel-level synchronization bug that could lead to kernel crashes or undefined behavior when MPTCP sockets are created under specific kernel configurations. The fix involves adding the missing RCU read-side critical section locks around the list traversal to ensure proper synchronization and prevent the warning and potential instability.
Potential Impact
For European organizations, the impact of CVE-2024-53047 primarily concerns systems running Linux kernels with MPTCP enabled and compiled with the debugging options CONFIG_PROVE_RCU_LIST and CONFIG_RCU_EXPERT. While these kernel options are typically used in development or debugging environments rather than production, any deployment of such kernels in critical infrastructure, cloud services, or enterprise servers could experience kernel panics or instability when MPTCP sockets are created. This could lead to denial of service conditions affecting network connectivity or application availability. Given the Linux kernel's widespread use across European governments, enterprises, and cloud providers, any instability at the kernel level can have cascading effects on service reliability. However, since the vulnerability requires specific kernel configurations and no known exploits exist, the immediate risk is limited. Nonetheless, organizations using MPTCP for advanced networking or load balancing should be aware of this issue and apply patches promptly to maintain kernel stability and avoid potential disruptions.
Mitigation Recommendations
1. Apply the official Linux kernel patches that add the missing rcu_read_lock()/rcu_read_unlock() calls in the MPTCP scheduler code to ensure proper RCU synchronization. 2. Review kernel build configurations and avoid enabling CONFIG_PROVE_RCU_LIST and CONFIG_RCU_EXPERT in production environments unless necessary for debugging, as these options increase sensitivity to RCU misuse. 3. For environments requiring MPTCP, validate kernel stability by testing socket creation and network operations under the patched kernel before deployment. 4. Monitor kernel logs for RCU warnings or splats related to MPTCP to detect any residual issues. 5. Coordinate with Linux distribution maintainers to ensure timely distribution of patched kernel packages. 6. If custom kernels are used, integrate the fix from the upstream Linux kernel source to prevent this vulnerability. 7. Implement robust kernel crash recovery and monitoring mechanisms to minimize downtime in case of unexpected kernel faults.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-11-19T17:17:24.973Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdf80c
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 2:12:19 PM
Last updated: 8/3/2025, 1:11:49 AM
Views: 10
Related Threats
CVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-43988: n/a
CriticalCVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-43986: n/a
CriticalCVE-2025-43982: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.