CVE-2024-39504

5.5 MEDIUM

📋 TL;DR

This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's netfilter nft_inner component. Attackers can trigger a kernel crash (denial of service) by sending specially crafted netlink messages that lack mandatory attributes. Systems running vulnerable Linux kernel versions with netfilter enabled are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE description, but references indicate stable kernel patches. Typically affects versions before the fix commits.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires netfilter subsystem with nftables support. Systems without nftables or with netfilter disabled are not vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical or remote console access to reboot.

🟠

Likely Case

Local denial of service through kernel crash, requiring reboot to restore functionality.

🟢

If Mitigated

Minimal impact if proper access controls prevent unprivileged users from sending netlink messages to the kernel.

🌐 Internet-Facing: LOW - This requires local access or ability to send netlink messages to the kernel, which typically isn't exposed to internet.
🏢 Internal Only: MEDIUM - Local users or processes with CAP_NET_ADMIN capability could exploit this to crash the kernel.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to send netlink messages to kernel, typically requiring CAP_NET_ADMIN capability or root access. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 39323f54cad29602917848346c71b087da92a19d, b30669fdea0ca03aa22995e6c99f7e7d9dee89ff, c4ab9da85b9df3692f861512fe6c9812f38b7471

Vendor Advisory: https://git.kernel.org/stable/c/39323f54cad29602917848346c71b087da92a19d

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check distribution-specific security advisories for patched kernel packages. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable nftables

linux

Remove nftables module to disable vulnerable functionality

modprobe -r nf_tables
echo 'blacklist nf_tables' >> /etc/modprobe.d/blacklist.conf

Restrict netlink access

linux

Limit which users/processes can send netlink messages via capability restrictions

setcap -r /path/to/binary cap_net_admin
Use SELinux/AppArmor to restrict netlink socket access

🧯 If You Can't Patch

  • Implement strict access controls to prevent unprivileged users from obtaining CAP_NET_ADMIN capability
  • Monitor for kernel panic/crash events and implement automated recovery procedures

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if nftables module is loaded: lsmod | grep nf_tables && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to one containing fix commits: git log --oneline | grep -E '39323f54cad29602917848346c71b087da92a19d|b30669fdea0ca03aa22995e6c99f7e7d9dee89ff|c4ab9da85b9df3692f861512fe6c9812f38b7471'

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/messages or dmesg
  • System crash/reboot events
  • Netlink error messages related to nft_inner

Network Indicators:

  • Unusual netlink socket activity from non-privileged processes

SIEM Query:

source="kernel" AND ("kernel panic" OR "Oops" OR "NULL pointer dereference") AND "nft"

🔗 References

📤 Share & Export