CVE-2024-50045

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's br_netfilter module causes kernel panic when untagged traffic exceeding VxLAN MTU is forwarded through a bridge with VxLAN ports. This affects Linux systems using bridge networking with VxLAN devices and br_netfilter enabled. The vulnerability leads to denial of service through system crashes.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Multiple stable kernel versions before fixes were applied (specific versions in git commits provided)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Requires specific configuration: br_netfilter module loaded, net.bridge.bridge-nf-call-iptables=1, bridge with VxLAN device as port, untagged frames larger than VxLAN MTU.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash and denial of service requiring reboot, potentially disrupting all network services on affected systems.

🟠

Likely Case

System crash and reboot when specific network conditions are met, causing temporary service disruption.

🟢

If Mitigated

No impact if br_netfilter is not loaded or bridge-nf-call-iptables is disabled.

🌐 Internet-Facing: LOW - Requires specific internal network configuration with VxLAN bridges.
🏢 Internal Only: MEDIUM - Affects internal systems using bridge networking with VxLAN, particularly in virtualization or container environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires ability to send network traffic meeting specific conditions to affected bridge configuration. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple kernel versions with fixes (see git commit references)

Vendor Advisory: https://git.kernel.org/stable/c/3453f5839420bfbb85c86c61e49f49ffd0f041c4

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system to load new kernel. 3. Verify kernel version with 'uname -r'.

🔧 Temporary Workarounds

Disable br_netfilter

linux

Unload br_netfilter module to prevent vulnerability trigger

sudo modprobe -r br_netfilter

Disable bridge-nf-call-iptables

linux

Set sysctl parameter to 0 to bypass vulnerable code path

sudo sysctl -w net.bridge.bridge-nf-call-iptables=0

🧯 If You Can't Patch

  • Disable br_netfilter module if not required for functionality
  • Ensure net.bridge.bridge-nf-call-iptables is set to 0

🔍 How to Verify

Check if Vulnerable:

Check if br_netfilter is loaded: 'lsmod | grep br_netfilter'. Check sysctl setting: 'sysctl net.bridge.bridge-nf-call-iptables'. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to patched version with 'uname -r'. Test network traffic through VxLAN bridge with large untagged packets.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages mentioning br_nf_dev_queue_xmit
  • NULL pointer dereference errors in kernel logs
  • System crash/reboot events

Network Indicators:

  • Large untagged packets being forwarded through VxLAN bridges
  • Network traffic patterns matching vulnerability conditions

SIEM Query:

source="kernel" AND ("br_nf_dev_queue_xmit" OR "NULL pointer dereference" OR "kernel panic")

🔗 References

📤 Share & Export