CVE-2024-35981

5.5 MEDIUM

📋 TL;DR

A vulnerability in the Linux kernel's virtio_net driver causes a kernel infinite loop when attempting to configure RSS (Receive Side Scaling) on virtio network devices that don't support it. This leads to a denial of service condition where the affected system becomes unresponsive. The vulnerability affects Linux systems using QEMU/KVM virtualization with virtio network devices.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but fix commits indicate stable kernel versions before the fix
Operating Systems: Linux distributions using affected kernel versions with virtio_net driver
Default Config Vulnerable: ⚠️ Yes
Notes: Requires virtio network devices in QEMU/KVM virtualization environment. The vulnerability triggers when attempting to configure RSS on devices that don't support it.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system lockup requiring hard reboot, potentially causing data loss and extended service downtime.

🟠

Likely Case

System becomes unresponsive when RSS configuration is attempted on unsupported virtio devices, requiring manual intervention to restore service.

🟢

If Mitigated

No impact if RSS configuration is not attempted on affected virtio devices or if systems are patched.

🌐 Internet-Facing: LOW - Requires local access or ability to execute commands on the host system.
🏢 Internal Only: MEDIUM - Could be exploited by users with local access or through compromised containers/VMs to cause denial of service.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to run 'ethtool -X eth0 hfunc toeplitz' command on affected system. This typically requires local access or ability to execute commands through other means.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing fixes from the provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/059a49aa2e25c58f90b50151f109dd3c4cdb3a47

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check with your distribution vendor for specific patched kernel versions. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Avoid RSS configuration on virtio devices

linux

Prevent triggering the vulnerability by avoiding RSS configuration commands on virtio network devices

# Do not run: ethtool -X eth0 hfunc toeplitz
# Or any other RSS configuration commands on virtio devices

Disable virtio_net module

linux

Temporarily disable the affected driver if not required

# modprobe -r virtio_net
# Add 'blacklist virtio_net' to /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Restrict user access to ethtool command and network configuration utilities
  • Implement strict access controls to prevent unauthorized users from executing network configuration commands

🔍 How to Verify

Check if Vulnerable:

Check if system uses virtio network devices and test with 'ethtool -X eth0 hfunc toeplitz' (WARNING: This will trigger the vulnerability if present)

Check Version:

uname -r

Verify Fix Applied:

Check kernel version against patched versions from your distribution vendor, or verify the fix commit is present in your kernel

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System becoming unresponsive after network configuration
  • QEMU error messages about broken virtio devices

Network Indicators:

  • Sudden loss of connectivity from affected host
  • No response to ping or other network probes

SIEM Query:

Search for 'ethtool -X' command execution or kernel panic events related to virtio_net

🔗 References

📤 Share & Export