CVE-2024-53139

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's SCTP IPv6 implementation. The sctp_v6_available() function accesses network device structures without proper RCU locking, potentially allowing local attackers to crash the kernel or execute arbitrary code. Systems running vulnerable Linux kernel versions with SCTP IPv6 support are affected.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific versions between initial introduction of the bug and the fix (exact range depends on kernel distribution backports)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SCTP protocol support and IPv6 networking. Many distributions have SCTP modules loaded by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, leading to complete system compromise.

🟠

Likely Case

Kernel panic or system crash causing denial of service.

🟢

If Mitigated

Limited impact if SCTP is disabled or IPv6 is not used.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system.
🏢 Internal Only: MEDIUM - Local users or compromised services could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of kernel memory layout. The vulnerability was discovered through lockdep debugging.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits 05656a66592759242c74063616291b7274d11b2f, ad975697211f4f2c4ce61c3ba524fd14d88ceab8, or eb72e7fcc83987d5d5595b43222f23b295d5de7f applied

Vendor Advisory: https://git.kernel.org/stable/c/05656a66592759242c74063616291b7274d11b2f

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your distribution vendor. 2. Reboot the system to load the new kernel.

🔧 Temporary Workarounds

Disable SCTP module

linux

Unload the SCTP kernel module to prevent exploitation

sudo rmmod sctp
echo 'blacklist sctp' | sudo tee /etc/modprobe.d/blacklist-sctp.conf

Disable IPv6

linux

Disable IPv6 networking to mitigate the vulnerability

echo 'net.ipv6.conf.all.disable_ipv6 = 1' | sudo tee -a /etc/sysctl.conf
sudo sysctl -p

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor system logs for kernel panics or suspicious SCTP-related activity

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if SCTP module is loaded: lsmod | grep sctp

Check Version:

uname -r

Verify Fix Applied:

Check kernel version after update and verify SCTP module functions normally

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • RCU warnings in dmesg
  • SCTP bind failures

Network Indicators:

  • Unusual SCTP traffic from local processes

SIEM Query:

source="kernel" AND ("RCU" OR "sctp" OR "panic")

🔗 References

📤 Share & Export