CVE-2024-36902
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's IPv6 routing subsystem allows attackers to cause a kernel panic (system crash) through specially crafted network traffic. This affects Linux systems with IPv6 enabled, potentially leading to denial of service. The vulnerability is triggered when the fib6_rule_action() function fails to properly check for NULL before using the result of ip6_dst_idev().
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Complete system crash/kernel panic leading to denial of service, requiring system reboot to restore functionality.
Likely Case
System crash or instability when processing malformed IPv6 routing packets, causing temporary service disruption.
If Mitigated
Minimal impact if IPv6 is disabled or systems are behind firewalls filtering IPv6 traffic.
🎯 Exploit Status
Exploitation requires sending specially crafted IPv6 packets to trigger the NULL dereference. The syzbot crash report indicates the vulnerability is triggerable but no public exploit code is mentioned.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel commits referenced: 1876881c9a49, 35297fc68de3, 4a5a573387da, 674c951ab8a2, 7e3242c139c3
Vendor Advisory: https://git.kernel.org/stable/c/1876881c9a49613b5249fb400cbf53412d90cb09
Restart Required: Yes
Instructions:
1. Update Linux kernel to a patched version containing the fix commits. 2. Check with your distribution vendor for specific kernel updates. 3. Reboot the system after kernel update.
🔧 Temporary Workarounds
Disable IPv6
linuxCompletely disable IPv6 networking to prevent exploitation
echo 'net.ipv6.conf.all.disable_ipv6 = 1' >> /etc/sysctl.conf
echo 'net.ipv6.conf.default.disable_ipv6 = 1' >> /etc/sysctl.conf
sysctl -p
Firewall IPv6 Traffic
linuxBlock incoming IPv6 traffic at network perimeter
ip6tables -P INPUT DROP
ip6tables -P FORWARD DROP
🧯 If You Can't Patch
- Implement strict network segmentation to limit IPv6 traffic to trusted sources only
- Deploy network intrusion prevention systems (IPS) to detect and block malicious IPv6 packets
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with patched versions from distribution vendor. Check if IPv6 is enabled: 'ip -6 addr show' or 'cat /proc/sys/net/ipv6/conf/all/disable_ipv6'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update and ensure it includes the fix commits. Test system stability with IPv6 traffic.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs mentioning 'NULL pointer dereference'
- System crash/reboot logs
- IPv6 routing error messages in kernel logs
Network Indicators:
- Unusual IPv6 packet patterns targeting routing infrastructure
- Multiple connection attempts to IPv6 services
SIEM Query:
source="kernel" AND ("NULL pointer" OR "general protection fault" OR "KASAN: null-ptr-deref")
🔗 References
- https://git.kernel.org/stable/c/1876881c9a49613b5249fb400cbf53412d90cb09
- https://git.kernel.org/stable/c/35297fc68de36826087e976f86a5b1f94fd0bf95
- https://git.kernel.org/stable/c/4a5a573387da6a6b23a4cc62147453ff1bc32afa
- https://git.kernel.org/stable/c/674c951ab8a23f7aff9b4c3f2f865901bc76a290
- https://git.kernel.org/stable/c/7e3242c139c38e60844638e394c2877b16b396b0
- https://git.kernel.org/stable/c/8745a8d74ba17dafe72b6ab461fa6c007d879747
- https://git.kernel.org/stable/c/d101291b2681e5ab938554e3e323f7a7ee33e3aa
- https://git.kernel.org/stable/c/ddec23f206a944c73bcc2724358b85388837daff
- https://git.kernel.org/stable/c/1876881c9a49613b5249fb400cbf53412d90cb09
- https://git.kernel.org/stable/c/35297fc68de36826087e976f86a5b1f94fd0bf95
- https://git.kernel.org/stable/c/4a5a573387da6a6b23a4cc62147453ff1bc32afa
- https://git.kernel.org/stable/c/674c951ab8a23f7aff9b4c3f2f865901bc76a290
- https://git.kernel.org/stable/c/7e3242c139c38e60844638e394c2877b16b396b0
- https://git.kernel.org/stable/c/8745a8d74ba17dafe72b6ab461fa6c007d879747
- https://git.kernel.org/stable/c/d101291b2681e5ab938554e3e323f7a7ee33e3aa
- https://git.kernel.org/stable/c/ddec23f206a944c73bcc2724358b85388837daff
- https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
- https://security.netapp.com/advisory/ntap-20240926-0002/