Skip to main content

CVE-2024-53120: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-53120cvecve-2024-53120
Published: Mon Dec 02 2024 (12/02/2024, 13:44:51 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: CT: Fix null-ptr-deref in add rule err flow In error flow of mlx5_tc_ct_entry_add_rule(), in case ct_rule_add() callback returns error, zone_rule->attr is used uninitiated. Fix it to use attr which has the needed pointer value. Kernel log: BUG: kernel NULL pointer dereference, address: 0000000000000110 RIP: 0010:mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] … Call Trace: <TASK> ? __die+0x20/0x70 ? page_fault_oops+0x150/0x3e0 ? exc_page_fault+0x74/0x140 ? asm_exc_page_fault+0x22/0x30 ? mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] ? mlx5_tc_ct_entry_add_rule+0x1d5/0x2f0 [mlx5_core] mlx5_tc_ct_block_flow_offload+0xc6a/0xf90 [mlx5_core] ? nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] flow_offload_work_handler+0x142/0x320 [nf_flow_table] ? finish_task_switch.isra.0+0x15b/0x2b0 process_one_work+0x16c/0x320 worker_thread+0x28c/0x3a0 ? __pfx_worker_thread+0x10/0x10 kthread+0xb8/0xf0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2d/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK>

AI-Powered Analysis

AILast updated: 06/28/2025, 15:11:20 UTC

Technical Analysis

CVE-2024-53120 is a vulnerability identified in the Linux kernel, specifically within the Mellanox mlx5_core driver component responsible for network traffic control (TC) and connection tracking (CT) offloading. The flaw arises in the error handling path of the function mlx5_tc_ct_entry_add_rule(). When the callback ct_rule_add() returns an error, the code erroneously uses an uninitialized pointer zone_rule->attr instead of the properly initialized attr pointer. This leads to a NULL pointer dereference, causing a kernel crash (kernel oops) as evidenced by the kernel log showing a BUG at address 0x110. The stack trace indicates the fault occurs during rule addition in the mlx5e driver, which is part of the Mellanox network interface card (NIC) driver stack. This vulnerability is a denial-of-service (DoS) vector because it causes the kernel to crash or panic when triggered. Exploitation requires triggering the error flow in mlx5_tc_ct_entry_add_rule(), which likely involves manipulating network traffic control rules or connection tracking offload rules on systems using Mellanox NICs with the affected driver version. The vulnerability affects Linux kernel versions identified by the given commit hashes, and no CVSS score or known exploits in the wild have been reported as of the publication date (December 2, 2024).

Potential Impact

For European organizations, the impact of CVE-2024-53120 primarily manifests as a potential denial-of-service condition on Linux servers or network appliances using Mellanox NICs with the affected mlx5_core driver. Such NICs are common in data centers, cloud infrastructure, and high-performance computing environments. A successful exploitation could cause kernel crashes, leading to service interruptions, system reboots, and potential data loss if unsaved data is present. This can affect critical infrastructure, financial institutions, telecommunications providers, and enterprises relying on Linux-based network appliances or servers. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could be leveraged in multi-stage attacks or cause operational disruptions. Given the widespread use of Linux in European IT environments and the presence of Mellanox hardware in enterprise-grade networking equipment, the risk of service degradation or outages is significant, especially in environments with automated network rule management or complex traffic control configurations.

Mitigation Recommendations

To mitigate CVE-2024-53120, European organizations should: 1) Apply the official Linux kernel patches that fix the null pointer dereference in mlx5_tc_ct_entry_add_rule() as soon as they become available. Monitor Linux kernel mailing lists and vendor advisories for updated kernel releases containing the fix. 2) Identify and inventory all systems using Mellanox NICs with the mlx5_core driver, focusing on those running affected kernel versions. 3) Temporarily disable or restrict the use of connection tracking offload and traffic control rule additions on affected systems if patching is not immediately feasible. 4) Implement strict access controls and monitoring on systems that manage network traffic control rules to prevent unauthorized or malformed rule insertions that could trigger the error path. 5) Employ kernel crash monitoring and alerting to detect and respond rapidly to any kernel oops or reboots indicative of exploitation attempts. 6) Coordinate with hardware vendors and Linux distribution maintainers to ensure timely updates and guidance. These steps go beyond generic advice by focusing on the specific driver and feature involved, emphasizing proactive inventory, access control, and monitoring tailored to the mlx5_core driver's role in network traffic management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-11-19T17:17:24.994Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfa6e

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 3:11:20 PM

Last updated: 8/14/2025, 5:25:09 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats