Skip to main content

CVE-2024-43878: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-43878cvecve-2024-43878
Published: Wed Aug 21 2024 (08/21/2024, 00:06:30 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: Fix input error path memory access When there is a misconfiguration of input state slow path KASAN report error. Fix this error. west login: [ 52.987278] eth1: renamed from veth11 [ 53.078814] eth1: renamed from veth21 [ 53.181355] eth1: renamed from veth31 [ 54.921702] ================================================================== [ 54.922602] BUG: KASAN: wild-memory-access in xfrmi_rcv_cb+0x2d/0x295 [ 54.923393] Read of size 8 at addr 6b6b6b6b00000000 by task ping/512 [ 54.924169] [ 54.924386] CPU: 0 PID: 512 Comm: ping Not tainted 6.9.0-08574-gcd29a4313a1b #25 [ 54.925290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 54.926401] Call Trace: [ 54.926731] <IRQ> [ 54.927009] dump_stack_lvl+0x2a/0x3b [ 54.927478] kasan_report+0x84/0xa6 [ 54.927930] ? xfrmi_rcv_cb+0x2d/0x295 [ 54.928410] xfrmi_rcv_cb+0x2d/0x295 [ 54.928872] ? xfrm4_rcv_cb+0x3d/0x5e [ 54.929354] xfrm4_rcv_cb+0x46/0x5e [ 54.929804] xfrm_rcv_cb+0x7e/0xa1 [ 54.930240] xfrm_input+0x1b3a/0x1b96 [ 54.930715] ? xfrm_offload+0x41/0x41 [ 54.931182] ? raw_rcv+0x292/0x292 [ 54.931617] ? nf_conntrack_confirm+0xa2/0xa2 [ 54.932158] ? skb_sec_path+0xd/0x3f [ 54.932610] ? xfrmi_input+0x90/0xce [ 54.933066] xfrm4_esp_rcv+0x33/0x54 [ 54.933521] ip_protocol_deliver_rcu+0xd7/0x1b2 [ 54.934089] ip_local_deliver_finish+0x110/0x120 [ 54.934659] ? ip_protocol_deliver_rcu+0x1b2/0x1b2 [ 54.935248] NF_HOOK.constprop.0+0xf8/0x138 [ 54.935767] ? ip_sublist_rcv_finish+0x68/0x68 [ 54.936317] ? secure_tcpv6_ts_off+0x23/0x168 [ 54.936859] ? ip_protocol_deliver_rcu+0x1b2/0x1b2 [ 54.937454] ? __xfrm_policy_check2.constprop.0+0x18d/0x18d [ 54.938135] NF_HOOK.constprop.0+0xf8/0x138 [ 54.938663] ? ip_sublist_rcv_finish+0x68/0x68 [ 54.939220] ? __xfrm_policy_check2.constprop.0+0x18d/0x18d [ 54.939904] ? ip_local_deliver_finish+0x120/0x120 [ 54.940497] __netif_receive_skb_one_core+0xc9/0x107 [ 54.941121] ? __netif_receive_skb_list_core+0x1c2/0x1c2 [ 54.941771] ? blk_mq_start_stopped_hw_queues+0xc7/0xf9 [ 54.942413] ? blk_mq_start_stopped_hw_queue+0x38/0x38 [ 54.943044] ? virtqueue_get_buf_ctx+0x295/0x46b [ 54.943618] process_backlog+0xb3/0x187 [ 54.944102] __napi_poll.constprop.0+0x57/0x1a7 [ 54.944669] net_rx_action+0x1cb/0x380 [ 54.945150] ? __napi_poll.constprop.0+0x1a7/0x1a7 [ 54.945744] ? vring_new_virtqueue+0x17a/0x17a [ 54.946300] ? note_interrupt+0x2cd/0x367 [ 54.946805] handle_softirqs+0x13c/0x2c9 [ 54.947300] do_softirq+0x5f/0x7d [ 54.947727] </IRQ> [ 54.948014] <TASK> [ 54.948300] __local_bh_enable_ip+0x48/0x62 [ 54.948832] __neigh_event_send+0x3fd/0x4ca [ 54.949361] neigh_resolve_output+0x1e/0x210 [ 54.949896] ip_finish_output2+0x4bf/0x4f0 [ 54.950410] ? __ip_finish_output+0x171/0x1b8 [ 54.950956] ip_send_skb+0x25/0x57 [ 54.951390] raw_sendmsg+0xf95/0x10c0 [ 54.951850] ? check_new_pages+0x45/0x71 [ 54.952343] ? raw_hash_sk+0x21b/0x21b [ 54.952815] ? kernel_init_pages+0x42/0x51 [ 54.953337] ? prep_new_page+0x44/0x51 [ 54.953811] ? get_page_from_freelist+0x72b/0x915 [ 54.954390] ? signal_pending_state+0x77/0x77 [ 54.954936] ? preempt_count_sub+0x14/0xb3 [ 54.955450] ? __might_resched+0x8a/0x240 [ 54.955951] ? __might_sleep+0x25/0xa0 [ 54.956424] ? first_zones_zonelist+0x2c/0x43 [ 54.956977] ? __rcu_read_lock+0x2d/0x3a [ 54.957476] ? __pte_offset_map+0x32/0xa4 [ 54.957980] ? __might_resched+0x8a/0x240 [ 54.958483] ? __might_sleep+0x25/0xa0 [ 54.958963] ? inet_send_prepare+0x54/0x54 [ 54.959478] ? sock_sendmsg_nosec+0x42/0x6c [ 54.960000] sock_sendmsg_nosec+0x42/0x6c [ 54.960502] __sys_sendto+0x15d/0x1cc [ 54.960966] ? __x64_sys_getpeername+0x44/0x44 [ 54.961522] ? __handle_mm_fault+0x679/0xae4 [ 54.962068] ? find_vma+0x6b/0x ---truncated---

AI-Powered Analysis

AILast updated: 06/28/2025, 22:12:21 UTC

Technical Analysis

CVE-2024-43878 is a vulnerability identified in the Linux kernel's XFRM (IPsec) subsystem, specifically related to the input error path memory access. The issue arises when there is a misconfiguration of the input state slow path, which triggers a Kernel Address Sanitizer (KASAN) report indicating a wild memory access. The vulnerability manifests as an out-of-bounds read of 8 bytes at an invalid memory address during the processing of network packets within the xfrmi_rcv_cb function. This function is involved in receiving and processing IPsec packets. The kernel log excerpt shows a KASAN error triggered by a 'ping' task, indicating that crafted network traffic or malformed packets could exploit this flaw. The root cause is improper handling of error paths in the XFRM input processing code, leading to dereferencing of invalid pointers. This can cause kernel crashes (denial of service) or potentially memory corruption. The vulnerability affects Linux kernel version 6.9.0 and likely other versions with similar XFRM code. No public exploits are currently known, and no CVSS score has been assigned yet. The vulnerability was reserved and published in August 2024, with a patch presumably available in recent kernel updates. The technical details confirm the flaw is in the Linux kernel's networking stack, specifically the IPsec implementation, which is widely used for secure VPN communications and network security in enterprise environments.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the vulnerable XFRM code, especially those utilizing IPsec for VPNs, secure communications, or network segmentation. Exploitation could lead to kernel crashes causing denial of service, disrupting critical network services and potentially impacting business continuity. In worst cases, memory corruption might allow privilege escalation or arbitrary code execution, threatening confidentiality and integrity of sensitive data. Given the widespread use of Linux in servers, cloud infrastructure, and embedded devices across Europe, the vulnerability could affect a broad range of sectors including finance, government, telecommunications, and critical infrastructure. Organizations relying on IPsec VPNs for secure remote access or site-to-site connectivity are particularly at risk. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits once patches are widely deployed. The vulnerability's exploitation requires network access and the ability to send crafted packets, which means perimeter defenses and network segmentation are important factors in exposure.

Mitigation Recommendations

European organizations should promptly apply the latest Linux kernel patches that address CVE-2024-43878 once available. Until patches are deployed, network administrators should monitor and restrict IPsec traffic to trusted sources and consider temporarily disabling IPsec tunnels if feasible. Implement strict network segmentation and firewall rules to limit exposure of vulnerable hosts to untrusted networks. Employ intrusion detection systems (IDS) and network anomaly detection to identify suspicious packet patterns targeting the XFRM subsystem. Regularly audit Linux kernel versions in use and maintain an inventory of systems running IPsec to prioritize patching. For environments using containerization or virtualization, ensure host kernels are updated as the vulnerability affects the kernel level. Additionally, review and harden IPsec configurations to avoid misconfigurations that could trigger the vulnerability. Engage in proactive threat hunting for signs of exploitation attempts in network and system logs. Finally, educate security teams about this vulnerability to ensure rapid response to any emerging exploit reports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-17T09:11:59.286Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0b6a

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/28/2025, 10:12:21 PM

Last updated: 7/31/2025, 6:25:17 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats