CVE-2024-36281: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules rx_create no longer allocates a modify_hdr instance that needs to be cleaned up. The mlx5_modify_header_dealloc call will lead to a NULL pointer dereference. A leak in the rules also previously occurred since there are now two rules populated related to status. BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 109907067 P4D 109907067 PUD 116890067 PMD 0 Oops: 0000 [#1] SMP CPU: 1 PID: 484 Comm: ip Not tainted 6.9.0-rc2-rrameshbabu+ #254 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS Arch Linux 1.16.3-1-1 04/01/2014 RIP: 0010:mlx5_modify_header_dealloc+0xd/0x70 <snip> Call Trace: <TASK> ? show_regs+0x60/0x70 ? __die+0x24/0x70 ? page_fault_oops+0x15f/0x430 ? free_to_partial_list.constprop.0+0x79/0x150 ? do_user_addr_fault+0x2c9/0x5c0 ? exc_page_fault+0x63/0x110 ? asm_exc_page_fault+0x27/0x30 ? mlx5_modify_header_dealloc+0xd/0x70 rx_create+0x374/0x590 rx_add_rule+0x3ad/0x500 ? rx_add_rule+0x3ad/0x500 ? mlx5_cmd_exec+0x2c/0x40 ? mlx5_create_ipsec_obj+0xd6/0x200 mlx5e_accel_ipsec_fs_add_rule+0x31/0xf0 mlx5e_xfrm_add_state+0x426/0xc00 <snip>
AI Analysis
Technical Summary
CVE-2024-36281 is a vulnerability identified in the Linux kernel, specifically within the Mellanox mlx5 network driver subsystem that handles IPsec offloading and packet processing. The flaw arises from improper handling of status rules and memory management in the mlx5_ipsec_rx_status_destroy and rx_create functions. The vulnerability manifests as a NULL pointer dereference triggered by the mlx5_modify_header_dealloc call, which attempts to free a modify_hdr instance that was not properly allocated or has already been cleaned up. This leads to a kernel crash (BUG: kernel NULL pointer dereference) and a page fault in kernel mode, causing a denial of service (DoS) condition. The root cause is the existence of two status rules being populated simultaneously, which previously caused resource leaks and now results in a NULL pointer dereference during cleanup. The stack trace shows the fault occurs during IPsec state addition and rule creation in the mlx5e_accel_ipsec_fs_add_rule and mlx5e_xfrm_add_state functions. This vulnerability affects Linux kernel versions containing the specified commits and is relevant to systems using Mellanox mlx5 network cards with IPsec acceleration enabled. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to servers and network infrastructure utilizing Mellanox mlx5 network adapters with Linux kernels vulnerable to this flaw. The impact is predominantly a denial of service, where affected systems may crash or become unresponsive due to kernel panics triggered by the NULL pointer dereference. This can disrupt critical network services, especially in data centers, cloud providers, and enterprises relying on IPsec for secure communications. The vulnerability does not appear to allow privilege escalation or remote code execution directly but can be exploited to cause service outages. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure that deploy Linux-based systems with Mellanox hardware are at higher risk. The disruption of IPsec offloading could also degrade network performance and security posture. Given the kernel-level nature of the bug, recovery requires system reboots and patching, which may impact operational continuity.
Mitigation Recommendations
To mitigate CVE-2024-36281, European organizations should: 1) Identify all Linux systems using Mellanox mlx5 network adapters, particularly those with IPsec acceleration enabled. 2) Apply the latest Linux kernel patches or updates that address this vulnerability as soon as they become available from trusted Linux distributions or the kernel mainline. 3) Temporarily disable IPsec offloading on mlx5 devices if patching is not immediately feasible, to prevent triggering the bug. This can be done via driver or device configuration parameters. 4) Monitor kernel logs and system stability for signs of crashes or oops messages related to mlx5_modify_header_dealloc or IPsec rule creation. 5) Implement robust system monitoring and automated reboot procedures to minimize downtime in case of crashes. 6) Engage with Mellanox/NVIDIA support for firmware or driver updates that may complement kernel fixes. 7) Review network security policies to ensure fallback mechanisms exist if IPsec offloading is disabled. 8) Conduct thorough testing of patches in staging environments before production deployment to avoid regressions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark, Italy, Spain
CVE-2024-36281: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules rx_create no longer allocates a modify_hdr instance that needs to be cleaned up. The mlx5_modify_header_dealloc call will lead to a NULL pointer dereference. A leak in the rules also previously occurred since there are now two rules populated related to status. BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 109907067 P4D 109907067 PUD 116890067 PMD 0 Oops: 0000 [#1] SMP CPU: 1 PID: 484 Comm: ip Not tainted 6.9.0-rc2-rrameshbabu+ #254 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS Arch Linux 1.16.3-1-1 04/01/2014 RIP: 0010:mlx5_modify_header_dealloc+0xd/0x70 <snip> Call Trace: <TASK> ? show_regs+0x60/0x70 ? __die+0x24/0x70 ? page_fault_oops+0x15f/0x430 ? free_to_partial_list.constprop.0+0x79/0x150 ? do_user_addr_fault+0x2c9/0x5c0 ? exc_page_fault+0x63/0x110 ? asm_exc_page_fault+0x27/0x30 ? mlx5_modify_header_dealloc+0xd/0x70 rx_create+0x374/0x590 rx_add_rule+0x3ad/0x500 ? rx_add_rule+0x3ad/0x500 ? mlx5_cmd_exec+0x2c/0x40 ? mlx5_create_ipsec_obj+0xd6/0x200 mlx5e_accel_ipsec_fs_add_rule+0x31/0xf0 mlx5e_xfrm_add_state+0x426/0xc00 <snip>
AI-Powered Analysis
Technical Analysis
CVE-2024-36281 is a vulnerability identified in the Linux kernel, specifically within the Mellanox mlx5 network driver subsystem that handles IPsec offloading and packet processing. The flaw arises from improper handling of status rules and memory management in the mlx5_ipsec_rx_status_destroy and rx_create functions. The vulnerability manifests as a NULL pointer dereference triggered by the mlx5_modify_header_dealloc call, which attempts to free a modify_hdr instance that was not properly allocated or has already been cleaned up. This leads to a kernel crash (BUG: kernel NULL pointer dereference) and a page fault in kernel mode, causing a denial of service (DoS) condition. The root cause is the existence of two status rules being populated simultaneously, which previously caused resource leaks and now results in a NULL pointer dereference during cleanup. The stack trace shows the fault occurs during IPsec state addition and rule creation in the mlx5e_accel_ipsec_fs_add_rule and mlx5e_xfrm_add_state functions. This vulnerability affects Linux kernel versions containing the specified commits and is relevant to systems using Mellanox mlx5 network cards with IPsec acceleration enabled. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to servers and network infrastructure utilizing Mellanox mlx5 network adapters with Linux kernels vulnerable to this flaw. The impact is predominantly a denial of service, where affected systems may crash or become unresponsive due to kernel panics triggered by the NULL pointer dereference. This can disrupt critical network services, especially in data centers, cloud providers, and enterprises relying on IPsec for secure communications. The vulnerability does not appear to allow privilege escalation or remote code execution directly but can be exploited to cause service outages. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure that deploy Linux-based systems with Mellanox hardware are at higher risk. The disruption of IPsec offloading could also degrade network performance and security posture. Given the kernel-level nature of the bug, recovery requires system reboots and patching, which may impact operational continuity.
Mitigation Recommendations
To mitigate CVE-2024-36281, European organizations should: 1) Identify all Linux systems using Mellanox mlx5 network adapters, particularly those with IPsec acceleration enabled. 2) Apply the latest Linux kernel patches or updates that address this vulnerability as soon as they become available from trusted Linux distributions or the kernel mainline. 3) Temporarily disable IPsec offloading on mlx5 devices if patching is not immediately feasible, to prevent triggering the bug. This can be done via driver or device configuration parameters. 4) Monitor kernel logs and system stability for signs of crashes or oops messages related to mlx5_modify_header_dealloc or IPsec rule creation. 5) Implement robust system monitoring and automated reboot procedures to minimize downtime in case of crashes. 6) Engage with Mellanox/NVIDIA support for firmware or driver updates that may complement kernel fixes. 7) Review network security policies to ensure fallback mechanisms exist if IPsec offloading is disabled. 8) Conduct thorough testing of patches in staging environments before production deployment to avoid regressions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-06-21T10:12:11.453Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe2539
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 9:39:48 AM
Last updated: 7/29/2025, 7:09:22 AM
Views: 13
Related Threats
CVE-2025-9000: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8993: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8992: Cross-Site Request Forgery in mtons mblog
MediumCVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.