Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0639: Deadlock

0
Medium
VulnerabilityCVE-2024-0639cvecve-2024-0639
Published: Wed Jan 17 2024 (01/17/2024, 15:14:47 UTC)
Source: CVE Database V5

Description

A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel’s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.

AI-Powered Analysis

AILast updated: 11/20/2025, 19:01:31 UTC

Technical Analysis

CVE-2024-0639 is a denial of service vulnerability identified in the Linux kernel's Stream Control Transmission Protocol (SCTP) subsystem, specifically within the sctp_auto_asconf_init function in net/sctp/socket.c. The vulnerability is caused by a deadlock condition that can be triggered by local users with limited privileges. SCTP is a transport layer protocol used primarily in telecommunications and some specialized networking environments. The flaw allows an attacker with local access to induce a deadlock in the kernel's SCTP handling code, which can cause the system to hang or crash, resulting in a denial of service. The CVSS 3.1 base score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), requires low complexity (AC:L), and low privileges (PR:L), with no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no patches were linked in the provided data, but it is expected that Linux kernel maintainers will release fixes. This vulnerability is relevant to any Linux system running a kernel version that includes the vulnerable SCTP code, particularly in environments where local user access is possible. The deadlock can disrupt critical services relying on SCTP, such as telecom signaling or other specialized network communications.

Potential Impact

For European organizations, the primary impact is the potential for denial of service on Linux systems running the vulnerable SCTP subsystem. This could disrupt services that rely on SCTP, including telecommunications infrastructure, signaling systems, and specialized network applications. Organizations with multi-tenant environments or shared servers where local user access is granted to untrusted users are at higher risk. The availability impact could lead to downtime, service interruptions, and operational disruptions. While the vulnerability does not affect confidentiality or integrity, the loss of availability can have cascading effects on business continuity and service level agreements. Telecom operators, cloud providers, and enterprises using Linux-based network appliances or servers in Europe should assess their exposure. The lack of known exploits reduces immediate risk, but the ease of exploitation with low privileges means the threat could escalate if exploited by insiders or attackers gaining local access.

Mitigation Recommendations

1. Apply official Linux kernel patches addressing CVE-2024-0639 as soon as they become available from trusted sources such as the Linux kernel mailing list or distribution vendors. 2. Restrict local user access on systems running the SCTP subsystem to trusted personnel only, minimizing the risk of exploitation by unprivileged users. 3. Disable the SCTP protocol if it is not required for operational purposes, using kernel configuration options or runtime controls to reduce the attack surface. 4. Monitor system logs and kernel messages for signs of deadlock or unusual SCTP activity that could indicate attempted exploitation. 5. Employ mandatory access controls (e.g., SELinux, AppArmor) to limit the capabilities of local users and contain potential abuse of SCTP subsystem calls. 6. For multi-tenant or shared environments, isolate user privileges and consider containerization or virtualization strategies to limit the impact of a local denial of service. 7. Maintain up-to-date backups and incident response plans to quickly recover from any service disruptions caused by exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-17T09:18:42.812Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8557cba0e608b4fb1eed3

Added to database: 10/10/2025, 12:38:20 AM

Last enriched: 11/20/2025, 7:01:31 PM

Last updated: 12/4/2025, 10:31:42 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats