Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23849: n/a

0
Medium
VulnerabilityCVE-2024-23849cvecve-2024-23849
Published: Tue Jan 23 2024 (01/23/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.

AI-Powered Analysis

AILast updated: 11/05/2025, 00:50:39 UTC

Technical Analysis

CVE-2024-23849 is a vulnerability identified in the Linux kernel's RDS (Reliable Datagram Sockets) networking subsystem, specifically within the function rds_recv_track_latency located in net/rds/af_rds.c. The issue is an off-by-one error in the comparison against RDS_MSG_RX_DGRAM_TRACE_MAX, which leads to an out-of-bounds memory access. This type of error occurs when the code incorrectly handles boundary conditions, allowing access to memory just beyond the intended buffer. The consequence of this out-of-bounds access is a potential denial of service (DoS) condition, as it can cause the kernel to crash or behave unpredictably. According to the CVSS v3.1 vector (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H), the vulnerability requires local access with low attack complexity and privileges, does not require user interaction, and impacts availability only, without compromising confidentiality or integrity. The vulnerability affects Linux kernel versions through 6.7.1, which means many modern Linux distributions could be impacted if they have not yet applied patches. Although no public exploits are known at this time, the presence of this flaw in a critical kernel subsystem warrants attention. RDS is often used in clustered or high-performance computing environments, so systems relying on this protocol are at higher risk. The vulnerability is categorized under CWE-193 (Off-by-one Error), a common programming error that can lead to memory corruption issues.

Potential Impact

For European organizations, the primary impact of CVE-2024-23849 is the potential for denial of service on Linux systems utilizing the RDS subsystem. This can disrupt critical services, especially in environments relying on high-performance computing clusters, database clusters, or other distributed systems where RDS is employed for efficient communication. The kernel crash could lead to system downtime, loss of availability, and operational interruptions. While confidentiality and integrity are not directly affected, the availability impact can have cascading effects on business continuity and service level agreements. Organizations with large Linux server deployments, including cloud providers, research institutions, and enterprises running Linux-based infrastructure, are at risk. The requirement for local privileges means that attackers must already have some level of access, but the low complexity of exploitation increases the threat from insider threats or compromised accounts. Given the widespread use of Linux in European data centers and critical infrastructure, unpatched systems could face increased operational risk.

Mitigation Recommendations

To mitigate CVE-2024-23849, organizations should prioritize applying official Linux kernel patches once they are released by maintainers or their Linux distribution vendors. Until patches are available, if RDS is not essential, disabling the RDS module or subsystem can reduce exposure. System administrators should audit their environments to identify systems running affected kernel versions and assess the use of RDS. Employing strict access controls to limit local user privileges can reduce the risk of exploitation. Monitoring system logs for unusual kernel errors or crashes related to RDS may help detect attempted exploitation. Additionally, maintaining up-to-date backups and ensuring robust incident response plans will help mitigate the impact of potential denial of service events. Coordination with Linux distribution vendors for timely updates and testing patches in staging environments before production deployment is recommended to avoid service disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41e182aa0cae2b43628

Added to database: 5/30/2025, 2:43:42 PM

Last enriched: 11/5/2025, 12:50:39 AM

Last updated: 11/30/2025, 12:35:43 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats