CVE-2024-47684

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's TCP implementation allows denial of service attacks. The vulnerability occurs when tcp_rto_delta_us() receives a NULL skb pointer, leading to kernel crashes. Systems running affected Linux kernel versions with TCP connections are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific versions mentioned in references, particularly Ubuntu 20.04.6 with 5.4.0-174-generic kernel
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggered by TCP operations, particularly in TLP (Tail Loss Probe) and RACK (Recent ACK) paths. Systems running ceph or other network-intensive applications may be more exposed.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and complete denial of service, requiring physical or remote reboot.

🟠

Likely Case

System instability and crashes affecting network connectivity and running services, particularly under high network load.

🟢

If Mitigated

Limited impact with proper kernel hardening and isolation, though crashes could still affect availability.

🌐 Internet-Facing: MEDIUM - Requires TCP connections but can be triggered remotely via network packets.
🏢 Internal Only: MEDIUM - Internal network traffic can also trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specific TCP packets to trigger the NULL pointer dereference. No public exploit code identified yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in kernel commits referenced in CVE

Vendor Advisory: https://git.kernel.org/stable/c/09aea49fbc7e755a915c405644f347137cdb62b0

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. For Ubuntu: sudo apt update && sudo apt upgrade linux-image-generic. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable TCP TLP and RACK features

linux

Disable TCP Tail Loss Probe and RACK features that trigger the vulnerable code path

sysctl -w net.ipv4.tcp_early_retrans=0
sysctl -w net.ipv4.tcp_recovery=0

🧯 If You Can't Patch

  • Implement network segmentation to limit exposure to untrusted networks
  • Monitor systems for kernel crashes and restart affected services automatically

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r and compare with affected versions. Check if system has experienced kernel crashes with NULL pointer dereference in tcp_rearm_rto().

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update and ensure no crashes occur during TCP operations. Monitor dmesg for related error messages.

📡 Detection & Monitoring

Log Indicators:

  • Kernel NULL pointer dereference messages in dmesg
  • References to tcp_rearm_rto() in crash logs
  • System crashes or reboots during network operations

Network Indicators:

  • Unusual TCP packet patterns triggering retransmissions
  • Connection resets during normal operations

SIEM Query:

source="kernel" AND "NULL pointer dereference" AND "tcp_rearm_rto"

🔗 References

📤 Share & Export