CVE-2024-44989: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference We shouldn't set real_dev to NULL because packets can be in transit and xfrm might call xdo_dev_offload_ok() in parallel. All callbacks assume real_dev is set. Example trace: kernel: BUG: unable to handle page fault for address: 0000000000001030 kernel: bond0: (slave eni0np1): making interface the new active one kernel: #PF: supervisor write access in kernel mode kernel: #PF: error_code(0x0002) - not-present page kernel: PGD 0 P4D 0 kernel: Oops: 0002 [#1] PREEMPT SMP kernel: CPU: 4 PID: 2237 Comm: ping Not tainted 6.7.7+ #12 kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014 kernel: RIP: 0010:nsim_ipsec_offload_ok+0xc/0x20 [netdevsim] kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA kernel: Code: e0 0f 0b 48 83 7f 38 00 74 de 0f 0b 48 8b 47 08 48 8b 37 48 8b 78 40 e9 b2 e5 9a d7 66 90 0f 1f 44 00 00 48 8b 86 80 02 00 00 <83> 80 30 10 00 00 01 b8 01 00 00 00 c3 0f 1f 80 00 00 00 00 0f 1f kernel: bond0: (slave eni0np1): making interface the new active one kernel: RSP: 0018:ffffabde81553b98 EFLAGS: 00010246 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA kernel: kernel: RAX: 0000000000000000 RBX: ffff9eb404e74900 RCX: ffff9eb403d97c60 kernel: RDX: ffffffffc090de10 RSI: ffff9eb404e74900 RDI: ffff9eb3c5de9e00 kernel: RBP: ffff9eb3c0a42000 R08: 0000000000000010 R09: 0000000000000014 kernel: R10: 7974203030303030 R11: 3030303030303030 R12: 0000000000000000 kernel: R13: ffff9eb3c5de9e00 R14: ffffabde81553cc8 R15: ffff9eb404c53000 kernel: FS: 00007f2a77a3ad00(0000) GS:ffff9eb43bd00000(0000) knlGS:0000000000000000 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kernel: CR2: 0000000000001030 CR3: 00000001122ab000 CR4: 0000000000350ef0 kernel: bond0: (slave eni0np1): making interface the new active one kernel: Call Trace: kernel: <TASK> kernel: ? __die+0x1f/0x60 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA kernel: ? page_fault_oops+0x142/0x4c0 kernel: ? do_user_addr_fault+0x65/0x670 kernel: ? kvm_read_and_reset_apf_flags+0x3b/0x50 kernel: bond0: (slave eni0np1): making interface the new active one kernel: ? exc_page_fault+0x7b/0x180 kernel: ? asm_exc_page_fault+0x22/0x30 kernel: ? nsim_bpf_uninit+0x50/0x50 [netdevsim] kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA kernel: ? nsim_ipsec_offload_ok+0xc/0x20 [netdevsim] kernel: bond0: (slave eni0np1): making interface the new active one kernel: bond_ipsec_offload_ok+0x7b/0x90 [bonding] kernel: xfrm_output+0x61/0x3b0 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA kernel: ip_push_pending_frames+0x56/0x80
AI Analysis
Technical Summary
CVE-2024-44989 is a vulnerability identified in the Linux kernel's bonding driver, specifically related to the handling of the 'real_dev' pointer in the context of IPsec offloading and the xfrm (transform) framework. The issue arises because the bonding driver sets the 'real_dev' pointer to NULL during certain operations, such as when switching active slave interfaces. However, packets may still be in transit, and the xfrm subsystem can concurrently invoke the function xdo_dev_offload_ok(), which assumes that 'real_dev' is always set and valid. If 'real_dev' is NULL, this leads to a null pointer dereference, causing a kernel crash (kernel oops) and potentially a denial of service (DoS). The provided kernel trace shows a page fault triggered by a supervisor write access in kernel mode due to this null pointer dereference. The vulnerability affects Linux kernel versions identified by the commit hash 18cb261afd7bf50134e5ccacc5ec91ea16efadd4 and likely other versions around this commit. The flaw is rooted in improper synchronization and state management in the bonding driver when interacting with the xfrm subsystem for IPsec offloading. This can cause system instability or crashes on affected systems running bonded network interfaces with IPsec offloading enabled. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability was reserved on August 21, 2024, and published on September 4, 2024.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems that utilize Linux bonding interfaces combined with IPsec offloading, a configuration common in high-availability and secure networking environments such as data centers, cloud providers, and enterprise networks. The impact includes potential denial of service due to kernel crashes, which can disrupt critical network services and applications relying on bonded interfaces for redundancy and throughput. This could lead to temporary loss of connectivity, degraded performance, or service outages. Organizations with infrastructure running Linux kernels vulnerable to this issue may face operational disruptions, especially if the bonding driver is actively used with IPsec offload features. While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the resulting instability could be leveraged by attackers to cause persistent denial of service or to facilitate further attacks by disrupting security controls. Given the widespread use of Linux in European IT infrastructure, including cloud platforms, telecom, and government systems, the vulnerability could affect a broad range of sectors. However, exploitation requires specific network configurations and conditions, somewhat limiting the scope of impact.
Mitigation Recommendations
To mitigate CVE-2024-44989, European organizations should: 1) Apply the latest Linux kernel patches that address this issue as soon as they become available from trusted sources or Linux distributions. 2) Review and audit network configurations to identify the use of bonding interfaces combined with IPsec offloading; consider temporarily disabling IPsec offloading on bonded interfaces if patching is not immediately feasible. 3) Implement monitoring for kernel oops or crashes related to bonding or xfrm subsystems to detect potential exploitation attempts or instability. 4) Test kernel updates in staging environments to ensure compatibility and stability before deployment in production. 5) For critical systems, consider network architecture adjustments to reduce reliance on bonding with IPsec offloading or use alternative secure networking methods until patches are applied. 6) Maintain robust backup and recovery procedures to minimize downtime in case of service disruption. These steps go beyond generic advice by focusing on the specific interaction between bonding and IPsec offloading and emphasizing proactive configuration review and monitoring.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-44989: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference We shouldn't set real_dev to NULL because packets can be in transit and xfrm might call xdo_dev_offload_ok() in parallel. All callbacks assume real_dev is set. Example trace: kernel: BUG: unable to handle page fault for address: 0000000000001030 kernel: bond0: (slave eni0np1): making interface the new active one kernel: #PF: supervisor write access in kernel mode kernel: #PF: error_code(0x0002) - not-present page kernel: PGD 0 P4D 0 kernel: Oops: 0002 [#1] PREEMPT SMP kernel: CPU: 4 PID: 2237 Comm: ping Not tainted 6.7.7+ #12 kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014 kernel: RIP: 0010:nsim_ipsec_offload_ok+0xc/0x20 [netdevsim] kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA kernel: Code: e0 0f 0b 48 83 7f 38 00 74 de 0f 0b 48 8b 47 08 48 8b 37 48 8b 78 40 e9 b2 e5 9a d7 66 90 0f 1f 44 00 00 48 8b 86 80 02 00 00 <83> 80 30 10 00 00 01 b8 01 00 00 00 c3 0f 1f 80 00 00 00 00 0f 1f kernel: bond0: (slave eni0np1): making interface the new active one kernel: RSP: 0018:ffffabde81553b98 EFLAGS: 00010246 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA kernel: kernel: RAX: 0000000000000000 RBX: ffff9eb404e74900 RCX: ffff9eb403d97c60 kernel: RDX: ffffffffc090de10 RSI: ffff9eb404e74900 RDI: ffff9eb3c5de9e00 kernel: RBP: ffff9eb3c0a42000 R08: 0000000000000010 R09: 0000000000000014 kernel: R10: 7974203030303030 R11: 3030303030303030 R12: 0000000000000000 kernel: R13: ffff9eb3c5de9e00 R14: ffffabde81553cc8 R15: ffff9eb404c53000 kernel: FS: 00007f2a77a3ad00(0000) GS:ffff9eb43bd00000(0000) knlGS:0000000000000000 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kernel: CR2: 0000000000001030 CR3: 00000001122ab000 CR4: 0000000000350ef0 kernel: bond0: (slave eni0np1): making interface the new active one kernel: Call Trace: kernel: <TASK> kernel: ? __die+0x1f/0x60 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA kernel: ? page_fault_oops+0x142/0x4c0 kernel: ? do_user_addr_fault+0x65/0x670 kernel: ? kvm_read_and_reset_apf_flags+0x3b/0x50 kernel: bond0: (slave eni0np1): making interface the new active one kernel: ? exc_page_fault+0x7b/0x180 kernel: ? asm_exc_page_fault+0x22/0x30 kernel: ? nsim_bpf_uninit+0x50/0x50 [netdevsim] kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA kernel: ? nsim_ipsec_offload_ok+0xc/0x20 [netdevsim] kernel: bond0: (slave eni0np1): making interface the new active one kernel: bond_ipsec_offload_ok+0x7b/0x90 [bonding] kernel: xfrm_output+0x61/0x3b0 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA kernel: ip_push_pending_frames+0x56/0x80
AI-Powered Analysis
Technical Analysis
CVE-2024-44989 is a vulnerability identified in the Linux kernel's bonding driver, specifically related to the handling of the 'real_dev' pointer in the context of IPsec offloading and the xfrm (transform) framework. The issue arises because the bonding driver sets the 'real_dev' pointer to NULL during certain operations, such as when switching active slave interfaces. However, packets may still be in transit, and the xfrm subsystem can concurrently invoke the function xdo_dev_offload_ok(), which assumes that 'real_dev' is always set and valid. If 'real_dev' is NULL, this leads to a null pointer dereference, causing a kernel crash (kernel oops) and potentially a denial of service (DoS). The provided kernel trace shows a page fault triggered by a supervisor write access in kernel mode due to this null pointer dereference. The vulnerability affects Linux kernel versions identified by the commit hash 18cb261afd7bf50134e5ccacc5ec91ea16efadd4 and likely other versions around this commit. The flaw is rooted in improper synchronization and state management in the bonding driver when interacting with the xfrm subsystem for IPsec offloading. This can cause system instability or crashes on affected systems running bonded network interfaces with IPsec offloading enabled. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability was reserved on August 21, 2024, and published on September 4, 2024.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems that utilize Linux bonding interfaces combined with IPsec offloading, a configuration common in high-availability and secure networking environments such as data centers, cloud providers, and enterprise networks. The impact includes potential denial of service due to kernel crashes, which can disrupt critical network services and applications relying on bonded interfaces for redundancy and throughput. This could lead to temporary loss of connectivity, degraded performance, or service outages. Organizations with infrastructure running Linux kernels vulnerable to this issue may face operational disruptions, especially if the bonding driver is actively used with IPsec offload features. While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the resulting instability could be leveraged by attackers to cause persistent denial of service or to facilitate further attacks by disrupting security controls. Given the widespread use of Linux in European IT infrastructure, including cloud platforms, telecom, and government systems, the vulnerability could affect a broad range of sectors. However, exploitation requires specific network configurations and conditions, somewhat limiting the scope of impact.
Mitigation Recommendations
To mitigate CVE-2024-44989, European organizations should: 1) Apply the latest Linux kernel patches that address this issue as soon as they become available from trusted sources or Linux distributions. 2) Review and audit network configurations to identify the use of bonding interfaces combined with IPsec offloading; consider temporarily disabling IPsec offloading on bonded interfaces if patching is not immediately feasible. 3) Implement monitoring for kernel oops or crashes related to bonding or xfrm subsystems to detect potential exploitation attempts or instability. 4) Test kernel updates in staging environments to ensure compatibility and stability before deployment in production. 5) For critical systems, consider network architecture adjustments to reduce reliance on bonding with IPsec offloading or use alternative secure networking methods until patches are applied. 6) Maintain robust backup and recovery procedures to minimize downtime in case of service disruption. These steps go beyond generic advice by focusing on the specific interaction between bonding and IPsec offloading and emphasizing proactive configuration review and monitoring.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-21T05:34:56.671Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9826c4522896dcbe0de2
Added to database: 5/21/2025, 9:08:54 AM
Last enriched: 6/28/2025, 11:26:13 PM
Last updated: 8/16/2025, 11:46:25 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.