CVE-2024-43836

5.5 MEDIUM

📋 TL;DR

This CVE describes a null pointer dereference vulnerability in the Linux kernel's ethtool PSE-PD subsystem. When a Power Sourcing Equipment (PSE) supports both IEEE 802.3c33 and PoDL (Power over Data Line) standards, but only one netlink attribute is specified during configuration, the kernel may dereference a null pointer, potentially causing a kernel panic or system crash. This affects Linux systems with vulnerable kernel versions that use ethtool for network interface configuration.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches exist for stable kernel trees. Likely affects versions before the fix commits.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using ethtool to configure PSE settings on network interfaces that support both c33 and PoDL standards.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical or remote console access to reboot the system.

🟠

Likely Case

System crash or kernel panic when configuring PSE settings via ethtool, resulting in temporary denial of service until system reboot.

🟢

If Mitigated

No impact if the vulnerable code path is not triggered through ethtool configuration operations.

🌐 Internet-Facing: LOW - This requires local access or privileged network access to trigger via ethtool configuration.
🏢 Internal Only: MEDIUM - Internal users with appropriate privileges could trigger this vulnerability, potentially causing system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access with CAP_NET_ADMIN capabilities or root privileges to execute ethtool commands. The vulnerability is triggered during specific configuration operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees via commits 4cddb0f15ea9c62f81b4889ea69a99368cc63a86 and e187690b125a297499eadeec53c32c5ed6d7436a

Vendor Advisory: https://git.kernel.org/stable/c/4cddb0f15ea9c62f81b4889ea69a99368cc63a86

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check with your distribution vendor for specific patched kernel versions. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Restrict ethtool access

linux

Limit access to ethtool command to prevent triggering the vulnerability

chmod 750 /sbin/ethtool
setcap -r /sbin/ethtool
Remove CAP_NET_ADMIN from non-essential users

Avoid PSE configuration

linux

Do not configure PSE settings via ethtool until patched

Avoid using 'ethtool --set-pse' commands

🧯 If You Can't Patch

  • Restrict user access to ethtool binary and remove CAP_NET_ADMIN capabilities from non-essential users
  • Implement monitoring for ethtool usage and system crashes, with alerting for potential exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if it contains the fix commits: 'uname -r' and verify with distribution vendor

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and test ethtool PSE configuration functionality

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs in /var/log/messages or journalctl
  • System crash/reboot events
  • ethtool command execution in audit logs

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Search for: 'kernel panic', 'Oops', 'ethtool', 'PSE' in system logs

🔗 References

📤 Share & Export