CVE-2024-47678
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
icmp: change the order of rate limits<br />
<br />
ICMP messages are ratelimited :<br />
<br />
After the blamed commits, the two rate limiters are applied in this order:<br />
<br />
1) host wide ratelimit (icmp_global_allow())<br />
<br />
2) Per destination ratelimit (inetpeer based)<br />
<br />
In order to avoid side-channels attacks, we need to apply<br />
the per destination check first.<br />
<br />
This patch makes the following change :<br />
<br />
1) icmp_global_allow() checks if the host wide limit is reached.<br />
But credits are not yet consumed. This is deferred to 3)<br />
<br />
2) The per destination limit is checked/updated.<br />
This might add a new node in inetpeer tree.<br />
<br />
3) icmp_global_consume() consumes tokens if prior operations succeeded.<br />
<br />
This means that host wide ratelimit is still effective<br />
in keeping inetpeer tree small even under DDOS.<br />
<br />
As a bonus, I removed icmp_global.lock as the fast path<br />
can use a lock-free operation.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.18 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.54 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/483397b4ba280813e4a9c161a0a85172ddb43d19
- https://git.kernel.org/stable/c/662ec52260cc07b9ae53ecd3925183c29d34288b
- https://git.kernel.org/stable/c/8c2bd38b95f75f3d2a08c93e35303e26d480d24e
- https://git.kernel.org/stable/c/997ba8889611891f91e8ad83583466aeab6239a3
- https://git.kernel.org/stable/c/a7722921adb046e3836eb84372241f32584bdb07
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



