Skip to main content

CVE-2024-44999: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-44999cvecve-2024-44999
Published: Wed Sep 04 2024 (09/04/2024, 19:54:43 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: gtp: pull network headers in gtp_dev_xmit() syzbot/KMSAN reported use of uninit-value in get_dev_xmit() [1] We must make sure the IPv4 or Ipv6 header is pulled in skb->head before accessing fields in them. Use pskb_inet_may_pull() to fix this issue. [1] BUG: KMSAN: uninit-value in ipv6_pdp_find drivers/net/gtp.c:220 [inline] BUG: KMSAN: uninit-value in gtp_build_skb_ip6 drivers/net/gtp.c:1229 [inline] BUG: KMSAN: uninit-value in gtp_dev_xmit+0x1424/0x2540 drivers/net/gtp.c:1281 ipv6_pdp_find drivers/net/gtp.c:220 [inline] gtp_build_skb_ip6 drivers/net/gtp.c:1229 [inline] gtp_dev_xmit+0x1424/0x2540 drivers/net/gtp.c:1281 __netdev_start_xmit include/linux/netdevice.h:4913 [inline] netdev_start_xmit include/linux/netdevice.h:4922 [inline] xmit_one net/core/dev.c:3580 [inline] dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3596 __dev_queue_xmit+0x358c/0x5610 net/core/dev.c:4423 dev_queue_xmit include/linux/netdevice.h:3105 [inline] packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276 packet_snd net/packet/af_packet.c:3145 [inline] packet_sendmsg+0x90e3/0xa3a0 net/packet/af_packet.c:3177 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x30f/0x380 net/socket.c:745 __sys_sendto+0x685/0x830 net/socket.c:2204 __do_sys_sendto net/socket.c:2216 [inline] __se_sys_sendto net/socket.c:2212 [inline] __x64_sys_sendto+0x125/0x1d0 net/socket.c:2212 x64_sys_call+0x3799/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit was created at: slab_post_alloc_hook mm/slub.c:3994 [inline] slab_alloc_node mm/slub.c:4037 [inline] kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4080 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:583 __alloc_skb+0x363/0x7b0 net/core/skbuff.c:674 alloc_skb include/linux/skbuff.h:1320 [inline] alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6526 sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2815 packet_alloc_skb net/packet/af_packet.c:2994 [inline] packet_snd net/packet/af_packet.c:3088 [inline] packet_sendmsg+0x749c/0xa3a0 net/packet/af_packet.c:3177 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x30f/0x380 net/socket.c:745 __sys_sendto+0x685/0x830 net/socket.c:2204 __do_sys_sendto net/socket.c:2216 [inline] __se_sys_sendto net/socket.c:2212 [inline] __x64_sys_sendto+0x125/0x1d0 net/socket.c:2212 x64_sys_call+0x3799/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f CPU: 0 UID: 0 PID: 7115 Comm: syz.1.515 Not tainted 6.11.0-rc1-syzkaller-00043-g94ede2a3e913 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024

AI-Powered Analysis

AILast updated: 06/28/2025, 23:40:00 UTC

Technical Analysis

CVE-2024-44999 is a vulnerability identified in the Linux kernel's GPRS Tunneling Protocol (GTP) implementation, specifically within the gtp_dev_xmit() function. The issue arises from the improper handling of network packet headers, where the IPv4 or IPv6 headers are not guaranteed to be fully pulled into the socket buffer's head (skb->head) before being accessed. This leads to the use of uninitialized values during packet processing, as detected by Kernel Memory Sanitizer (KMSAN) reports. The vulnerability is rooted in the failure to invoke pskb_inet_may_pull(), a kernel function that ensures the required header data is safely accessible. The uninitialized memory usage occurs in multiple internal functions such as ipv6_pdp_find, gtp_build_skb_ip6, and gtp_dev_xmit, which are part of the GTP network driver code. This flaw can potentially cause undefined behavior including kernel crashes, data leakage, or memory corruption. The vulnerability was discovered through syzbot fuzzing and KMSAN analysis, highlighting a subtle memory safety issue in the network stack's handling of GTP packets. The vulnerability affects Linux kernel versions prior to the patch that enforces proper header pulling. No public exploits are currently known, and the issue is primarily a memory safety bug rather than a direct remote code execution vector. However, given the kernel-level impact and the network-facing nature of GTP, exploitation could lead to denial of service or information disclosure in affected systems.

Potential Impact

For European organizations, the impact of CVE-2024-44999 could be significant, especially for those operating mobile network infrastructure, telecommunications equipment, or cloud services that rely on Linux-based systems handling GTP traffic. GTP is widely used in 4G and 5G mobile networks for tunneling user data and signaling between network nodes. A vulnerability in the GTP implementation could allow attackers to craft malicious packets that trigger kernel memory corruption or crashes, potentially disrupting mobile network services or exposing sensitive data processed by the kernel. Enterprises using Linux servers as part of their network infrastructure, including ISPs and cloud providers, may also be at risk if they handle GTP traffic or run vulnerable kernel versions. The vulnerability could lead to service outages, degraded network performance, or compromise of system stability. While no known exploits exist yet, the network-facing nature and kernel-level impact warrant urgent attention to prevent potential exploitation, especially in critical infrastructure sectors prevalent in Europe such as telecommunications, finance, and government services.

Mitigation Recommendations

To mitigate CVE-2024-44999, European organizations should: 1) Immediately apply the official Linux kernel patches that enforce the use of pskb_inet_may_pull() in the gtp_dev_xmit() function to ensure proper header validation and memory initialization. 2) Audit and update all Linux-based systems involved in mobile network operations or handling GTP traffic to the latest stable kernel versions containing the fix. 3) Implement network-level filtering to restrict and monitor GTP traffic, especially from untrusted or external sources, to reduce exposure to crafted malicious packets. 4) Employ kernel runtime security tools such as KMSAN or other memory sanitizers during testing phases to detect similar memory safety issues proactively. 5) Coordinate with telecom equipment vendors and cloud providers to confirm that their Linux kernel versions are patched and compliant. 6) Establish incident detection mechanisms focusing on unusual kernel crashes or network anomalies related to GTP traffic. 7) Consider network segmentation to isolate critical systems processing GTP traffic from general-purpose servers to limit blast radius in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-21T05:34:56.672Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0e33

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/28/2025, 11:40:00 PM

Last updated: 8/12/2025, 4:08:58 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats