CVE-2024-35985
📋 TL;DR
A Linux kernel vulnerability in the EEVDF scheduler allows a NULL pointer dereference due to integer overflow in reweight_eevdf(). This can cause kernel panic and system crashes. Affects Linux systems using the EEVDF scheduler.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to complete system crash and denial of service
Likely Case
System instability or crash under specific scheduler conditions
If Mitigated
No impact if patched or scheduler not triggered
🎯 Exploit Status
Exploitation requires local access and precise timing to trigger the integer overflow condition
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in git commits: 06f27e6d7bf0abf54488259ef36bbf0e1fccb35c, 1560d1f6eb6b398bddd80c16676776c0325fe5fe, 470d347b14b0ecffa9b39cf8f644fa2351db3efb
Vendor Advisory: https://git.kernel.org/stable/c/06f27e6d7bf0abf54488259ef36bbf0e1fccb35c
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version 2. Recompile kernel if using custom build 3. Reboot system to load new kernel
🔧 Temporary Workarounds
Disable EEVDF scheduler
linuxSwitch to alternative scheduler like CFS
Add 'sched=default' to kernel boot parameters
🧯 If You Can't Patch
- Restrict local user access to critical systems
- Implement kernel crash monitoring and automatic recovery
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if EEVDF scheduler is active: uname -r and check /proc/sys/kernel/sched_scheduler
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the git commit hashes for the fix
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- NULL pointer dereference in kernel logs
- System crash/reboot events
Network Indicators:
- Sudden system unavailability
SIEM Query:
event_type:kernel_panic OR event_type:system_crash AND process:scheduler
🔗 References
- https://git.kernel.org/stable/c/06f27e6d7bf0abf54488259ef36bbf0e1fccb35c
- https://git.kernel.org/stable/c/1560d1f6eb6b398bddd80c16676776c0325fe5fe
- https://git.kernel.org/stable/c/470d347b14b0ecffa9b39cf8f644fa2351db3efb
- https://git.kernel.org/stable/c/06f27e6d7bf0abf54488259ef36bbf0e1fccb35c
- https://git.kernel.org/stable/c/1560d1f6eb6b398bddd80c16676776c0325fe5fe
- https://git.kernel.org/stable/c/470d347b14b0ecffa9b39cf8f644fa2351db3efb