CVE-2024-57938
📋 TL;DR
This CVE-2024-57938 is an integer overflow vulnerability in the Linux kernel's SCTP protocol implementation. It allows attackers to trigger a kernel panic or denial of service by setting net.sctp.max_autoclose to UINT_MAX, affecting all Linux systems with SCTP enabled.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially disrupting critical network services.
Likely Case
Local denial of service through kernel panic, requiring system reboot to recover.
If Mitigated
Minimal impact if SCTP is disabled or proper access controls prevent unauthorized users from modifying kernel parameters.
🎯 Exploit Status
Exploitation requires local access and ability to modify kernel parameters. No public exploit code identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in Linux kernel stable releases referenced in CVE (multiple commit hashes provided)
Vendor Advisory: https://git.kernel.org/stable/c/081bdb3a31674339313c6d702af922bc29de2c53
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from official distribution repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable SCTP protocol
linuxPrevent exploitation by disabling SCTP protocol support
echo 'install sctp /bin/true' >> /etc/modprobe.d/disable-sctp.conf
rmmod sctp
Restrict kernel parameter modification
linuxLimit ability to modify net.sctp.max_autoclose parameter
sysctl -w kernel.sysctl_protected=1
chmod 644 /proc/sys/net/sctp/max_autoclose
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized users from modifying kernel parameters
- Monitor for attempts to modify net.sctp.max_autoclose parameter and alert on suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check if SCTP module is loaded: lsmod | grep sctp. Check kernel version against patched releases.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update: uname -r. Check that SCTP module is either disabled or system is running patched kernel.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs in /var/log/messages or dmesg
- Unexpected system reboots
- Failed attempts to modify net.sctp.max_autoclose
Network Indicators:
- SCTP protocol traffic if normally unused
- Unexpected SCTP connection attempts
SIEM Query:
source="kernel" AND ("panic" OR "Oops") AND "sctp"
🔗 References
- https://git.kernel.org/stable/c/081bdb3a31674339313c6d702af922bc29de2c53
- https://git.kernel.org/stable/c/2297890b778b0e7c8200d6818154f7e461d78e94
- https://git.kernel.org/stable/c/271f031f4c31c07e2a85a1ba2b4c8e734909a477
- https://git.kernel.org/stable/c/4e86729d1ff329815a6e8a920cb554a1d4cb5b8d
- https://git.kernel.org/stable/c/7af63ef5fe4d480064eb22583b24ffc8b408183a
- https://git.kernel.org/stable/c/94b7ed0a4896420988e1776942f0a3f67167873e
- https://git.kernel.org/stable/c/f9c3adb083d3278f065a83c3f667f1246c74c31f
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html