CVE-2024-36972
📋 TL;DR
A race condition vulnerability in the Linux kernel's AF_UNIX socket implementation allows a NULL pointer dereference when handling out-of-band (OOB) data. This can lead to kernel panic and system crash. Any system running an affected Linux kernel version is vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to complete system crash and denial of service, potentially causing data loss or service disruption.
Likely Case
System crash or kernel panic resulting in denial of service, requiring system reboot.
If Mitigated
No impact if patched; unpatched systems remain vulnerable to crashes.
🎯 Exploit Status
Exploitation requires triggering a race condition between garbage collection and OOB message handling, which may be challenging but feasible for skilled attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits: 4708f49add84a57ce0ccc7bf9a6269845c631cc3, 4bf6964451c3cb411fbaa1ae8b214b3d97a59bf1, 518a994aa0b87d96f1bc6678a7035df5d1fcd7a1, 9841991a446c87f90f66f4b9fee6fe934c1336a2, d59ae9314b97e01c76a4171472441e55721ba636
Vendor Advisory: https://git.kernel.org/stable/c/4708f49add84a57ce0ccc7bf9a6269845c631cc3
Restart Required: Yes
Instructions:
1. Update Linux kernel to a version containing the fix. 2. Check your distribution's security advisories for specific patched versions. 3. Reboot the system after kernel update.
🔧 Temporary Workarounds
Disable AF_UNIX sockets
linuxRemove or disable AF_UNIX socket usage if not required, though this may break IPC and some services.
Not applicable - requires application/service configuration changes
🧯 If You Can't Patch
- Restrict access to systems using AF_UNIX sockets to trusted users only.
- Monitor system logs for kernel panic or crash indicators and have incident response procedures ready.
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with distribution's security advisory for patched versions.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated to a version containing one of the fix commits listed in the CVE.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs, NULL pointer dereference errors in dmesg or system logs
Network Indicators:
- Unusual AF_UNIX socket traffic patterns
SIEM Query:
Search for 'kernel panic', 'NULL pointer dereference', or 'oops' in system logs with reference to AF_UNIX or skb_dequeue.
🔗 References
- https://git.kernel.org/stable/c/4708f49add84a57ce0ccc7bf9a6269845c631cc3
- https://git.kernel.org/stable/c/4bf6964451c3cb411fbaa1ae8b214b3d97a59bf1
- https://git.kernel.org/stable/c/518a994aa0b87d96f1bc6678a7035df5d1fcd7a1
- https://git.kernel.org/stable/c/9841991a446c87f90f66f4b9fee6fe934c1336a2
- https://git.kernel.org/stable/c/d59ae9314b97e01c76a4171472441e55721ba636
- https://git.kernel.org/stable/c/4708f49add84a57ce0ccc7bf9a6269845c631cc3
- https://git.kernel.org/stable/c/4bf6964451c3cb411fbaa1ae8b214b3d97a59bf1
- https://git.kernel.org/stable/c/518a994aa0b87d96f1bc6678a7035df5d1fcd7a1
- https://git.kernel.org/stable/c/9841991a446c87f90f66f4b9fee6fe934c1336a2
- https://git.kernel.org/stable/c/d59ae9314b97e01c76a4171472441e55721ba636