Skip to main content

CVE-2024-53091: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-53091cvecve-2024-53091
Published: Thu Nov 21 2024 (11/21/2024, 18:17:08 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx As the introduction of the support for vsock and unix sockets in sockmap, tls_sw_has_ctx_tx/rx cannot presume the socket passed in must be IS_ICSK. vsock and af_unix sockets have vsock_sock and unix_sock instead of inet_connection_sock. For these sockets, tls_get_ctx may return an invalid pointer and cause page fault in function tls_sw_ctx_rx. BUG: unable to handle page fault for address: 0000000000040030 Workqueue: vsock-loopback vsock_loopback_work RIP: 0010:sk_psock_strp_data_ready+0x23/0x60 Call Trace: ? __die+0x81/0xc3 ? no_context+0x194/0x350 ? do_page_fault+0x30/0x110 ? async_page_fault+0x3e/0x50 ? sk_psock_strp_data_ready+0x23/0x60 virtio_transport_recv_pkt+0x750/0x800 ? update_load_avg+0x7e/0x620 vsock_loopback_work+0xd0/0x100 process_one_work+0x1a7/0x360 worker_thread+0x30/0x390 ? create_worker+0x1a0/0x1a0 kthread+0x112/0x130 ? __kthread_cancel_work+0x40/0x40 ret_from_fork+0x1f/0x40 v2: - Add IS_ICSK check v3: - Update the commits in Fixes

AI-Powered Analysis

AILast updated: 06/28/2025, 14:54:40 UTC

Technical Analysis

CVE-2024-53091 is a vulnerability identified in the Linux kernel related to the handling of socket types in the BPF (Berkeley Packet Filter) subsystem, specifically within the TLS (Transport Layer Security) software context functions tls_sw_has_ctx_tx and tls_sw_has_ctx_rx. The issue arises from an incorrect assumption in the kernel code that sockets passed to these functions are always of type IS_ICSK (inet_connection_sock). However, with the introduction of support for vsock (virtual sockets) and AF_UNIX sockets in sockmap, this assumption no longer holds true. Vsock and AF_UNIX sockets use different socket structures (vsock_sock and unix_sock respectively) rather than inet_connection_sock. Consequently, when tls_get_ctx is called on these socket types, it may return an invalid pointer, leading to a page fault in the function tls_sw_ctx_rx. This results in a kernel BUG and a crash, as evidenced by the provided kernel stack trace showing a page fault at sk_psock_strp_data_ready and subsequent kernel panic. The vulnerability was addressed by adding explicit checks for IS_ICSK socket types before dereferencing pointers, preventing invalid memory access. This fix ensures that the TLS context functions do not operate on unsupported socket types, thereby preventing kernel crashes caused by page faults. The vulnerability affects Linux kernel versions prior to the patch and is particularly relevant for systems utilizing vsock and AF_UNIX sockets in conjunction with BPF sockmap and TLS offloading features. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-53091 primarily involves potential denial of service (DoS) conditions on Linux systems running vulnerable kernel versions that utilize BPF sockmap with TLS offloading and support for vsock or AF_UNIX sockets. Such systems could experience kernel panics and crashes due to page faults, leading to service interruptions. This is particularly critical for infrastructure relying on containerization, virtualization, or cloud-native applications where vsock is used for communication between host and guest or between containers. The vulnerability could disrupt critical services, affecting availability and operational continuity. While there is no indication of privilege escalation or remote code execution, the kernel crash could be triggered by local or potentially remote processes interacting with the affected socket types, increasing the attack surface. European organizations with high reliance on Linux-based servers, especially those in financial services, telecommunications, cloud providers, and critical infrastructure, may face operational risks if unpatched. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation once the vulnerability becomes widely known.

Mitigation Recommendations

Organizations should promptly apply the official Linux kernel patches that include the IS_ICSK socket type checks in the tls_sw_has_ctx_tx/rx functions. Kernel upgrades to the fixed versions are the most effective mitigation. For environments where immediate patching is not feasible, administrators should audit and limit the use of vsock and AF_UNIX sockets in conjunction with BPF sockmap and TLS offloading features, as these combinations trigger the vulnerability. Monitoring kernel logs for BUG messages related to sk_psock_strp_data_ready or page faults can help detect attempts to trigger the issue. Additionally, implementing strict access controls and sandboxing for processes that interact with these socket types can reduce the risk of exploitation. Organizations should also ensure robust backup and recovery procedures to minimize downtime in case of crashes. Finally, maintaining up-to-date threat intelligence feeds and subscribing to Linux kernel security advisories will help in timely detection and response to any emerging exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-11-19T17:17:24.981Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdf96d

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 2:54:40 PM

Last updated: 7/22/2025, 2:07:25 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats