CVE-2024-49864
📋 TL;DR
A race condition vulnerability in the Linux kernel's rxrpc subsystem allows packets to be processed before the I/O thread is fully initialized, potentially causing a kernel oops (crash). This affects systems using the AF_RXRPC socket implementation for remote procedure calls. The vulnerability can lead to denial of service but does not allow arbitrary code execution.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, requiring physical or remote console access to reboot.
Likely Case
System instability or crash when AF_RXRPC sockets are actively used, resulting in temporary service disruption.
If Mitigated
Minimal impact if AF_RXRPC is not used or if packets are dropped during the race window.
🎯 Exploit Status
Exploitation requires triggering the race condition by sending packets at the precise moment between socket setup and I/O thread creation. This is timing-dependent and may be difficult to reliably achieve.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in stable kernel trees via provided git commits (e.g., 56e415202b8a17de6496f4023e545fcb66f118ec).
Vendor Advisory: https://git.kernel.org/stable/c/56e415202b8a17de6496f4023e545fcb66f118ec
Restart Required: Yes
Instructions:
1. Update Linux kernel to a patched version from your distribution's repository. 2. Reboot the system to load the new kernel.
🔧 Temporary Workarounds
Disable AF_RXRPC module
linuxPrevent loading of the vulnerable rxrpc kernel module if not required.
echo 'install rxrpc /bin/true' >> /etc/modprobe.d/disable-rxrpc.conf
rmmod rxrpc
🧯 If You Can't Patch
- Ensure AF_RXRPC is not in use by checking active sockets and disabling the module.
- Implement network segmentation to restrict access to systems using AF_RXRPC, reducing attack surface.
🔍 How to Verify
Check if Vulnerable:
Check if AF_RXRPC is enabled and in use: 'lsmod | grep rxrpc' and 'ss -a | grep rxrpc'. If the module is loaded or sockets exist, the system may be vulnerable.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes one of the patched commits: 'uname -r' and check with distribution vendor for patch inclusion.
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages in /var/log/kern.log or dmesg output related to rxrpc or general protection faults.
Network Indicators:
- Unexpected UDP packets to ports associated with AF_RXRPC services (typically not standard ports).
SIEM Query:
source="kern.log" AND "rxrpc" AND ("Oops" OR "general protection fault")