CVE-2024-27010
📋 TL;DR
A deadlock vulnerability in the Linux kernel's traffic control subsystem allows denial of service when mirred actions create recursive packet loops. Systems using Linux kernel traffic shaping with specific mirroring configurations are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Complete system lockup requiring hard reboot, causing extended service disruption.
Likely Case
Local denial of service affecting network traffic on affected interfaces, potentially disrupting services.
If Mitigated
Minimal impact if traffic control rules avoid recursive mirroring scenarios.
🎯 Exploit Status
Exploit requires CAP_NET_ADMIN or root privileges to configure traffic control rules. The provided tc commands demonstrate trigger conditions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits 0f022d32c3eca477fbf79a205243a6123ed0fe11 and e6b90468da4dae2281a6e381107f411efb48b0ef
Vendor Advisory: https://git.kernel.org/stable/c/0f022d32c3eca477fbf79a205243a6123ed0fe11
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version with 'uname -r'.
🔧 Temporary Workarounds
Remove recursive traffic control rules
linuxIdentify and remove any tc rules that create mirroring loops between interfaces
tc filter show dev eth0
tc filter del dev eth0 parent 1: prio 2
tc filter show dev eth1
tc filter del dev eth1 parent 1: prio 2
🧯 If You Can't Patch
- Audit all traffic control configurations for recursive mirroring patterns
- Restrict CAP_NET_ADMIN capabilities to minimize attack surface
🔍 How to Verify
Check if Vulnerable:
Check kernel version and examine tc rules for recursive mirroring patterns like 'action mirred egress redirect dev eth0' on eth0 itself
Check Version:
uname -r
Verify Fix Applied:
After patching, test with provided tc commands - system should not deadlock and packets should be dropped instead
📡 Detection & Monitoring
Log Indicators:
- Kernel logs showing 'possible recursive locking detected' or 'DEADLOCK' warnings
- System becoming unresponsive with high CPU usage in network stack
Network Indicators:
- Sudden loss of network connectivity on specific interfaces
- Abnormal traffic patterns with packet loops
SIEM Query:
source="kernel" AND ("recursive locking" OR "DEADLOCK" OR "mirred")
🔗 References
- https://git.kernel.org/stable/c/0f022d32c3eca477fbf79a205243a6123ed0fe11
- https://git.kernel.org/stable/c/e6b90468da4dae2281a6e381107f411efb48b0ef
- https://git.kernel.org/stable/c/0f022d32c3eca477fbf79a205243a6123ed0fe11
- https://git.kernel.org/stable/c/e6b90468da4dae2281a6e381107f411efb48b0ef
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/