Skip to main content

CVE-2024-44934: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-44934cvecve-2024-44934
Published: Mon Aug 26 2024 (08/26/2024, 10:11:25 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: bridge: mcast: wait for previous gc cycles when removing port syzbot hit a use-after-free[1] which is caused because the bridge doesn't make sure that all previous garbage has been collected when removing a port. What happens is: CPU 1 CPU 2 start gc cycle remove port acquire gc lock first wait for lock call br_multicasg_gc() directly acquire lock now but free port the port can be freed while grp timers still running Make sure all previous gc cycles have finished by using flush_work before freeing the port. [1] BUG: KASAN: slab-use-after-free in br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861 Read of size 8 at addr ffff888071d6d000 by task syz.5.1232/9699 CPU: 1 PID: 9699 Comm: syz.5.1232 Not tainted 6.10.0-rc5-syzkaller-00021-g24ca36a562d6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call Trace: <IRQ> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm/kasan/report.c:601 br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861 call_timer_fn+0x1a3/0x610 kernel/time/timer.c:1792 expire_timers kernel/time/timer.c:1843 [inline] __run_timers+0x74b/0xaf0 kernel/time/timer.c:2417 __run_timer_base kernel/time/timer.c:2428 [inline] __run_timer_base kernel/time/timer.c:2421 [inline] run_timer_base+0x111/0x190 kernel/time/timer.c:2437

AI-Powered Analysis

AILast updated: 06/28/2025, 22:42:46 UTC

Technical Analysis

CVE-2024-44934 is a use-after-free vulnerability identified in the Linux kernel's network bridge multicast garbage collection mechanism. Specifically, the flaw occurs in the function br_multicast_port_group_expired within the net/bridge/br_multicast.c source file. The vulnerability arises because the bridge code does not ensure that all previous garbage collection (GC) cycles have completed before removing a port. In a multi-CPU environment, one CPU may initiate a GC cycle while another CPU concurrently removes a port and frees its associated memory without waiting for the GC cycle to finish. This race condition leads to a use-after-free scenario where timers related to multicast group management continue to run and access freed memory, causing kernel memory corruption. The issue was discovered by syzbot, a kernel fuzzing tool, and is evidenced by a KASAN (Kernel Address Sanitizer) report indicating a slab-use-after-free error. The root cause is that the bridge code fails to flush pending work (via flush_work) before freeing the port, allowing stale timers to execute on freed objects. This vulnerability affects Linux kernel versions prior to the fix introduced around the 6.10.0-rc5 release cycle. While no known exploits are reported in the wild yet, the nature of the flaw—kernel memory corruption due to improper synchronization—makes it a significant risk for denial of service or potential privilege escalation if exploited. The vulnerability is subtle and requires concurrent operations on bridge ports and multicast GC cycles, but it can be triggered by crafted network configurations or workloads that manipulate bridge ports and multicast groups rapidly.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with bridging enabled, especially in environments using multicast networking such as data centers, cloud infrastructure, and enterprise networks. The use-after-free can lead to kernel crashes (denial of service), destabilizing critical network infrastructure. In worst cases, it could be leveraged for privilege escalation or arbitrary code execution within the kernel context, threatening confidentiality and integrity of data and systems. Organizations relying on Linux-based network appliances, virtualized environments, or container orchestration platforms that use Linux bridging (e.g., Open vSwitch, Docker networking) are particularly at risk. Disruptions could affect service availability, impacting business continuity. Given the widespread use of Linux in European government, financial, telecommunications, and industrial sectors, the vulnerability could have broad operational impacts if exploited. Although no active exploits are known, the vulnerability’s presence in kernel code that handles network bridging—a critical function in many enterprise networks—means attackers with local or network access could attempt to trigger the flaw. This elevates the threat level for organizations with exposed Linux systems or multi-tenant environments where untrusted users have some level of access.

Mitigation Recommendations

European organizations should prioritize patching Linux kernels to versions that include the fix for CVE-2024-44934 as soon as updates are available from their Linux distribution vendors. Until patches are applied, administrators should: 1) Minimize use of Linux bridge multicast features if not required, or disable multicast snooping and related bridge features to reduce attack surface. 2) Restrict access to systems running Linux bridges, ensuring only trusted users and processes can manipulate bridge ports or multicast groups. 3) Monitor kernel logs and use kernel debugging tools to detect signs of use-after-free or KASAN reports indicative of exploitation attempts. 4) Employ network segmentation to isolate critical Linux bridge hosts from untrusted networks or users. 5) For virtualized or container environments, ensure hypervisor and container runtimes are updated and consider additional isolation controls to limit impact of kernel vulnerabilities. 6) Engage with Linux distribution security advisories and subscribe to vulnerability notifications to respond rapidly to new information or exploit reports. 7) Conduct internal testing of patches in staging environments to validate stability before deployment in production.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-21T05:34:56.664Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0c8f

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/28/2025, 10:42:46 PM

Last updated: 7/29/2025, 11:25:08 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats