CVE-2024-53120: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: CT: Fix null-ptr-deref in add rule err flow In error flow of mlx5_tc_ct_entry_add_rule(), in case ct_rule_add() callback returns error, zone_rule->attr is used uninitiated. Fix it to use attr which has the needed pointer value. Kernel log: BUG: kernel NULL pointer dereference, address: 0000000000000110 RIP: 0010:mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] … Call Trace: <TASK> ? __die+0x20/0x70 ? page_fault_oops+0x150/0x3e0 ? exc_page_fault+0x74/0x140 ? asm_exc_page_fault+0x22/0x30 ? mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] ? mlx5_tc_ct_entry_add_rule+0x1d5/0x2f0 [mlx5_core] mlx5_tc_ct_block_flow_offload+0xc6a/0xf90 [mlx5_core] ? nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] flow_offload_work_handler+0x142/0x320 [nf_flow_table] ? finish_task_switch.isra.0+0x15b/0x2b0 process_one_work+0x16c/0x320 worker_thread+0x28c/0x3a0 ? __pfx_worker_thread+0x10/0x10 kthread+0xb8/0xf0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2d/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK>
AI Analysis
Technical Summary
CVE-2024-53120 is a vulnerability identified in the Linux kernel, specifically within the Mellanox mlx5_core driver component responsible for network traffic control (TC) and connection tracking (CT) offloading. The flaw arises in the error handling path of the function mlx5_tc_ct_entry_add_rule(). When the callback ct_rule_add() returns an error, the code erroneously uses an uninitialized pointer zone_rule->attr instead of the properly initialized attr pointer. This leads to a NULL pointer dereference, causing a kernel crash (kernel oops) as evidenced by the kernel log showing a BUG at address 0x110. The stack trace indicates the fault occurs during rule addition in the mlx5e driver, which is part of the Mellanox network interface card (NIC) driver stack. This vulnerability is a denial-of-service (DoS) vector because it causes the kernel to crash or panic when triggered. Exploitation requires triggering the error flow in mlx5_tc_ct_entry_add_rule(), which likely involves manipulating network traffic control rules or connection tracking offload rules on systems using Mellanox NICs with the affected driver version. The vulnerability affects Linux kernel versions identified by the given commit hashes, and no CVSS score or known exploits in the wild have been reported as of the publication date (December 2, 2024).
Potential Impact
For European organizations, the impact of CVE-2024-53120 primarily manifests as a potential denial-of-service condition on Linux servers or network appliances using Mellanox NICs with the affected mlx5_core driver. Such NICs are common in data centers, cloud infrastructure, and high-performance computing environments. A successful exploitation could cause kernel crashes, leading to service interruptions, system reboots, and potential data loss if unsaved data is present. This can affect critical infrastructure, financial institutions, telecommunications providers, and enterprises relying on Linux-based network appliances or servers. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could be leveraged in multi-stage attacks or cause operational disruptions. Given the widespread use of Linux in European IT environments and the presence of Mellanox hardware in enterprise-grade networking equipment, the risk of service degradation or outages is significant, especially in environments with automated network rule management or complex traffic control configurations.
Mitigation Recommendations
To mitigate CVE-2024-53120, European organizations should: 1) Apply the official Linux kernel patches that fix the null pointer dereference in mlx5_tc_ct_entry_add_rule() as soon as they become available. Monitor Linux kernel mailing lists and vendor advisories for updated kernel releases containing the fix. 2) Identify and inventory all systems using Mellanox NICs with the mlx5_core driver, focusing on those running affected kernel versions. 3) Temporarily disable or restrict the use of connection tracking offload and traffic control rule additions on affected systems if patching is not immediately feasible. 4) Implement strict access controls and monitoring on systems that manage network traffic control rules to prevent unauthorized or malformed rule insertions that could trigger the error path. 5) Employ kernel crash monitoring and alerting to detect and respond rapidly to any kernel oops or reboots indicative of exploitation attempts. 6) Coordinate with hardware vendors and Linux distribution maintainers to ensure timely updates and guidance. These steps go beyond generic advice by focusing on the specific driver and feature involved, emphasizing proactive inventory, access control, and monitoring tailored to the mlx5_core driver's role in network traffic management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-53120: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: CT: Fix null-ptr-deref in add rule err flow In error flow of mlx5_tc_ct_entry_add_rule(), in case ct_rule_add() callback returns error, zone_rule->attr is used uninitiated. Fix it to use attr which has the needed pointer value. Kernel log: BUG: kernel NULL pointer dereference, address: 0000000000000110 RIP: 0010:mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] … Call Trace: <TASK> ? __die+0x20/0x70 ? page_fault_oops+0x150/0x3e0 ? exc_page_fault+0x74/0x140 ? asm_exc_page_fault+0x22/0x30 ? mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core] ? mlx5_tc_ct_entry_add_rule+0x1d5/0x2f0 [mlx5_core] mlx5_tc_ct_block_flow_offload+0xc6a/0xf90 [mlx5_core] ? nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table] flow_offload_work_handler+0x142/0x320 [nf_flow_table] ? finish_task_switch.isra.0+0x15b/0x2b0 process_one_work+0x16c/0x320 worker_thread+0x28c/0x3a0 ? __pfx_worker_thread+0x10/0x10 kthread+0xb8/0xf0 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2d/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 </TASK>
AI-Powered Analysis
Technical Analysis
CVE-2024-53120 is a vulnerability identified in the Linux kernel, specifically within the Mellanox mlx5_core driver component responsible for network traffic control (TC) and connection tracking (CT) offloading. The flaw arises in the error handling path of the function mlx5_tc_ct_entry_add_rule(). When the callback ct_rule_add() returns an error, the code erroneously uses an uninitialized pointer zone_rule->attr instead of the properly initialized attr pointer. This leads to a NULL pointer dereference, causing a kernel crash (kernel oops) as evidenced by the kernel log showing a BUG at address 0x110. The stack trace indicates the fault occurs during rule addition in the mlx5e driver, which is part of the Mellanox network interface card (NIC) driver stack. This vulnerability is a denial-of-service (DoS) vector because it causes the kernel to crash or panic when triggered. Exploitation requires triggering the error flow in mlx5_tc_ct_entry_add_rule(), which likely involves manipulating network traffic control rules or connection tracking offload rules on systems using Mellanox NICs with the affected driver version. The vulnerability affects Linux kernel versions identified by the given commit hashes, and no CVSS score or known exploits in the wild have been reported as of the publication date (December 2, 2024).
Potential Impact
For European organizations, the impact of CVE-2024-53120 primarily manifests as a potential denial-of-service condition on Linux servers or network appliances using Mellanox NICs with the affected mlx5_core driver. Such NICs are common in data centers, cloud infrastructure, and high-performance computing environments. A successful exploitation could cause kernel crashes, leading to service interruptions, system reboots, and potential data loss if unsaved data is present. This can affect critical infrastructure, financial institutions, telecommunications providers, and enterprises relying on Linux-based network appliances or servers. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could be leveraged in multi-stage attacks or cause operational disruptions. Given the widespread use of Linux in European IT environments and the presence of Mellanox hardware in enterprise-grade networking equipment, the risk of service degradation or outages is significant, especially in environments with automated network rule management or complex traffic control configurations.
Mitigation Recommendations
To mitigate CVE-2024-53120, European organizations should: 1) Apply the official Linux kernel patches that fix the null pointer dereference in mlx5_tc_ct_entry_add_rule() as soon as they become available. Monitor Linux kernel mailing lists and vendor advisories for updated kernel releases containing the fix. 2) Identify and inventory all systems using Mellanox NICs with the mlx5_core driver, focusing on those running affected kernel versions. 3) Temporarily disable or restrict the use of connection tracking offload and traffic control rule additions on affected systems if patching is not immediately feasible. 4) Implement strict access controls and monitoring on systems that manage network traffic control rules to prevent unauthorized or malformed rule insertions that could trigger the error path. 5) Employ kernel crash monitoring and alerting to detect and respond rapidly to any kernel oops or reboots indicative of exploitation attempts. 6) Coordinate with hardware vendors and Linux distribution maintainers to ensure timely updates and guidance. These steps go beyond generic advice by focusing on the specific driver and feature involved, emphasizing proactive inventory, access control, and monitoring tailored to the mlx5_core driver's role in network traffic management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-11-19T17:17:24.994Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9824c4522896dcbdfa6e
Added to database: 5/21/2025, 9:08:52 AM
Last enriched: 6/28/2025, 3:11:20 PM
Last updated: 8/14/2025, 5:25:09 PM
Views: 12
Related Threats
CVE-2025-55581: n/a
UnknownCVE-2025-52085: n/a
UnknownCVE-2025-43760: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-55613: n/a
HighCVE-2025-57800: CWE-523: Unprotected Transport of Credentials in advplyr audiobookshelf
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.