Skip to main content

CVE-2024-50299: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-50299cvecve-2024-50299
Published: Tue Nov 19 2024 (11/19/2024, 01:30:47 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb() A size validation fix similar to that in Commit 50619dbf8db7 ("sctp: add size validation when walking chunks") is also required in sctp_sf_ootb() to address a crash reported by syzbot: BUG: KMSAN: uninit-value in sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712 sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712 sctp_do_sm+0x181/0x93d0 net/sctp/sm_sideeffect.c:1166 sctp_endpoint_bh_rcv+0xc38/0xf90 net/sctp/endpointola.c:407 sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88 sctp_rcv+0x3831/0x3b20 net/sctp/input.c:243 sctp4_rcv+0x42/0x50 net/sctp/protocol.c:1159 ip_protocol_deliver_rcu+0xb51/0x13d0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x336/0x500 net/ipv4/ip_input.c:233

AI-Powered Analysis

AILast updated: 06/28/2025, 13:56:32 UTC

Technical Analysis

CVE-2024-50299 is a vulnerability identified in the Linux kernel's SCTP (Stream Control Transmission Protocol) implementation, specifically within the sctp_sf_ootb() function. SCTP is a transport-layer protocol used for message-oriented communication, often in telecommunication and signaling systems. The vulnerability arises due to improper validation of chunk sizes when processing out-of-the-blue (OOTB) SCTP packets. This flaw can lead to the kernel accessing uninitialized memory, as indicated by the KMSAN (Kernel Memory Sanitizer) crash report, which shows an uninitialized value usage in sctp_sf_ootb(). The issue is similar to a previously addressed vulnerability where size validation was added when walking chunks, but this particular function lacked the necessary checks. Exploiting this vulnerability could cause a kernel crash (denial of service) or potentially allow an attacker to execute arbitrary code or escalate privileges by manipulating SCTP packets to trigger the memory corruption. The vulnerability affects multiple versions of the Linux kernel identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, and it was publicly disclosed on November 19, 2024. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Linux-based infrastructure that uses SCTP for critical communications, such as telecom operators, financial institutions, and government agencies. A successful exploitation could lead to denial of service by crashing affected systems, disrupting services and communications. In more severe cases, if exploited for code execution or privilege escalation, attackers could gain control over affected systems, leading to data breaches, espionage, or sabotage. Given the widespread use of Linux in servers, cloud environments, and embedded systems across Europe, the potential impact spans from operational disruptions to severe security compromises. Organizations with real-time communication systems or those using SCTP for signaling are particularly vulnerable. The absence of known exploits currently reduces immediate risk, but the vulnerability's nature means it could be targeted once exploit code becomes available.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the patched versions that include the fix for CVE-2024-50299. Since the vulnerability is in the kernel SCTP implementation, applying kernel updates from trusted Linux distributions is critical. Organizations should: 1) Identify all systems running affected Linux kernel versions, especially those handling SCTP traffic. 2) Deploy kernel patches or upgrade to the latest stable kernel releases that address this vulnerability. 3) If immediate patching is not possible, consider disabling SCTP protocol support temporarily if it is not essential, to reduce attack surface. 4) Monitor network traffic for unusual SCTP packet patterns that could indicate exploitation attempts. 5) Employ intrusion detection systems with updated signatures to detect potential exploitation attempts. 6) Conduct thorough testing of patches in staging environments to ensure stability before production deployment. 7) Maintain robust incident response plans to quickly address any exploitation attempts. These steps go beyond generic advice by focusing on SCTP-specific controls and operational readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T19:36:19.987Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdf788

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 1:56:32 PM

Last updated: 8/15/2025, 1:32:08 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats