Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0639: Deadlock

0
Medium
VulnerabilityCVE-2024-0639cvecve-2024-0639
Published: Wed Jan 17 2024 (01/17/2024, 15:14:47 UTC)
Source: CVE Database V5

Description

A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:06:31 UTC

Technical Analysis

CVE-2024-0639 is a denial of service vulnerability identified in the Linux kernel's Stream Control Transmission Protocol (SCTP) subsystem, specifically within the sctp_auto_asconf_init function located in net/sctp/socket.c. SCTP is a transport-layer protocol used primarily in telecommunications and certain specialized networking scenarios. The vulnerability is caused by a deadlock condition that can be triggered by a local user with limited privileges on a guest system, such as a virtual machine or container. When exploited, the deadlock halts progress in the SCTP subsystem, potentially causing the entire kernel or system to become unresponsive or crash, resulting in a denial of service. The vulnerability does not affect confidentiality or integrity but severely impacts availability. Exploitation requires local access with at least limited privileges and does not require user interaction. The CVSS v3.1 score is 5.5 (medium severity), reflecting the local attack vector, low complexity, and the impact limited to availability. No known public exploits or patches have been reported at the time of publication, but vendors are expected to release fixes. This vulnerability is relevant to Linux distributions that include SCTP support in their kernels, which is common in telecom infrastructure, enterprise servers, and cloud environments running Linux guests.

Potential Impact

The primary impact of CVE-2024-0639 is denial of service through system hangs or crashes caused by a deadlock in the SCTP subsystem. Organizations running Linux systems with SCTP enabled, especially in virtualized or containerized environments where local user access is possible, face risks of service disruption. This can affect telecommunications providers, cloud service providers, and enterprises relying on SCTP for signaling or data transport. The denial of service could lead to downtime, loss of availability of critical services, and potential cascading failures in dependent systems. Since the vulnerability requires local access, the risk is higher in multi-tenant environments or where untrusted users have shell access. The lack of impact on confidentiality or integrity limits the scope to availability concerns. However, availability disruptions in critical infrastructure or telecom networks can have significant operational and financial consequences.

Mitigation Recommendations

To mitigate CVE-2024-0639, organizations should monitor for and apply kernel patches from their Linux distribution vendors as soon as they become available. Until patches are deployed, restrict local user access to trusted personnel only, especially on systems with SCTP enabled. Disable SCTP support in the kernel if it is not required for operational purposes, reducing the attack surface. Employ strict access controls and isolation mechanisms in virtualized and containerized environments to prevent unprivileged users from triggering the vulnerability. Regularly audit and monitor system logs for unusual SCTP subsystem activity or system hangs. Consider implementing kernel lockdown features or mandatory access controls (e.g., SELinux, AppArmor) to limit the ability of local users to interact with SCTP sockets. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential denial of service events.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-17T09:18:42.812Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8557cba0e608b4fb1eed3

Added to database: 10/10/2025, 12:38:20 AM

Last enriched: 2/28/2026, 11:06:31 AM

Last updated: 3/25/2026, 4:19:54 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses