Skip to main content

CVE-2024-36270: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-36270cvecve-2024-36270
Published: Fri Jun 21 2024 (06/21/2024, 10:18:07 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: tproxy: bail out if IP has been disabled on the device syzbot reports: general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] [..] RIP: 0010:nf_tproxy_laddr4+0xb7/0x340 net/ipv4/netfilter/nf_tproxy_ipv4.c:62 Call Trace: nft_tproxy_eval_v4 net/netfilter/nft_tproxy.c:56 [inline] nft_tproxy_eval+0xa9a/0x1a00 net/netfilter/nft_tproxy.c:168 __in_dev_get_rcu() can return NULL, so check for this.

AI-Powered Analysis

AILast updated: 06/29/2025, 09:39:40 UTC

Technical Analysis

CVE-2024-36270 is a recently disclosed vulnerability in the Linux kernel's netfilter subsystem, specifically within the Transparent Proxy (tproxy) IPv4 implementation. The vulnerability arises because the function __in_dev_get_rcu(), which is called during the evaluation of tproxy rules, can return a NULL pointer when the IP functionality is disabled on a network device. The vulnerable code path does not properly check for this NULL return value, leading to a null pointer dereference. This causes a general protection fault and kernel crash, as reported by syzbot with a KASAN (Kernel Address Sanitizer) null pointer dereference error. The fault occurs in the nf_tproxy_laddr4() function, which is responsible for handling local address lookups for tproxy in IPv4. The issue is triggered when netfilter attempts to evaluate tproxy rules on devices with IP disabled, resulting in an unhandled NULL pointer and subsequent kernel panic or system crash. This vulnerability affects Linux kernel versions identified by the commit hash cc6eb433856983e91071469c4ce57accb6947ccb and potentially other versions that have not yet applied the fix. The root cause is a missing NULL check after __in_dev_get_rcu() call, which should bail out if the IP is disabled on the device. While no known exploits are currently reported in the wild, the vulnerability can be triggered remotely if an attacker can influence netfilter tproxy rules or traffic on a vulnerable system. This could lead to denial of service (DoS) through kernel crashes. The vulnerability does not appear to allow privilege escalation or code execution directly but impacts system availability and stability.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to servers and network appliances running Linux kernels with netfilter tproxy enabled, especially those that handle IPv4 traffic and may have devices with IP disabled. The impact is mainly denial of service due to kernel crashes, which can disrupt critical services such as web hosting, firewalls, load balancers, and VPN gateways. Organizations relying on Linux-based infrastructure for internet-facing services or internal network security may experience outages or degraded performance. Given the widespread use of Linux in European data centers, cloud providers, and telecommunications infrastructure, the potential for service disruption is notable. Although no active exploitation is reported, the vulnerability could be leveraged by attackers to cause targeted outages or amplify the impact of other attacks by destabilizing network devices. This is particularly relevant for sectors with high availability requirements such as finance, healthcare, government, and critical infrastructure. The vulnerability also raises concerns for embedded Linux devices used in industrial control systems and IoT deployments across Europe, where patching may be slower and downtime more impactful.

Mitigation Recommendations

To mitigate CVE-2024-36270, European organizations should: 1) Immediately apply the official Linux kernel patches that add the necessary NULL pointer checks in the nf_tproxy_laddr4() function to prevent kernel crashes. Monitor Linux kernel mailing lists and vendor advisories for updated stable kernel releases containing the fix. 2) Audit network devices and servers to identify those running vulnerable kernel versions with netfilter tproxy enabled, especially those with IP disabled on any network interfaces. 3) Temporarily disable netfilter tproxy functionality if patching is not immediately feasible, to prevent triggering the vulnerability. 4) Implement network segmentation and strict firewall rules to limit exposure of vulnerable systems to untrusted networks, reducing the risk of remote triggering. 5) Enhance monitoring and alerting for kernel panics or unexpected reboots on Linux hosts to detect potential exploitation attempts early. 6) Coordinate with Linux distribution vendors and embedded device manufacturers to ensure timely patch deployment across all affected systems. 7) For critical infrastructure, conduct thorough testing of patches in staging environments to avoid service disruptions during updates. 8) Educate system administrators about the vulnerability and the importance of applying kernel updates promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-21T10:13:16.302Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe252a

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 9:39:40 AM

Last updated: 8/12/2025, 1:24:31 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats