CVE-2024-27404

4.7 MEDIUM

📋 TL;DR

This CVE addresses a data race condition in the Linux kernel's MPTCP (Multipath TCP) implementation where concurrent access to the remote_id variable could cause memory corruption or system instability. It affects Linux systems using MPTCP functionality. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected kernel versions not specified in CVE, but patches available for stable branches
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with MPTCP enabled and in use. Many distributions may not have MPTCP enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or privilege escalation leading to complete system compromise.

🟠

Likely Case

System instability, kernel crashes, or denial of service affecting MPTCP connections.

🟢

If Mitigated

Minimal impact with proper access controls preventing local user exploitation.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly reachable from internet.
🏢 Internal Only: MEDIUM - Local users or processes could potentially exploit this to cause system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and race condition triggering. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel branches via provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/2dba5774e8ed326a78ad4339d921a4291281ea6e

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable MPTCP

linux

Disable MPTCP functionality if not required

echo 0 > /proc/sys/net/mptcp/enabled
sysctl -w net.mptcp.enabled=0

🧯 If You Can't Patch

  • Restrict local user access to prevent exploitation
  • Implement strict process isolation and privilege separation

🔍 How to Verify

Check if Vulnerable:

Check kernel version and MPTCP status: cat /proc/sys/net/mptcp/enabled

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check git commit contains fixes for remote_id data race

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • MPTCP connection failures
  • System crash dumps

Network Indicators:

  • MPTCP connection anomalies
  • Unexpected TCP resets

SIEM Query:

source="kernel" AND ("panic" OR "oops" OR "MPTCP")

🔗 References

📤 Share & Export