Linux Kernel up to 6.4 SCTP net/sctp/socket.c sctp_auto_asconf_init deadlock

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.2 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.4. Affected by this vulnerability is the function sctp_auto_asconf_init of the file net/sctp/socket.c of the component SCTP. Such manipulation leads to deadlock.
This vulnerability is uniquely identified as CVE-2024-0639. No exploit exists.
You should upgrade the affected component.
Details
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.4 (Operating System). Affected by this issue is the function sctp_auto_asconf_init of the file net/sctp/socket.c of the component SCTP. The manipulation with an unknown input leads to a deadlock vulnerability. Using CWE to declare the problem leads to CWE-833. The product contains multiple threads or executable segments that are waiting for each other to release a necessary lock, resulting in deadlock. Impacted is availability.
The weakness was disclosed 01/17/2024. The advisory is shared for download at bugzilla.redhat.com. This vulnerability is handled as CVE-2024-0639 since 01/17/2024. There are known technical details, but no exploit is available.
Upgrading to version 6.5-rc1 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying the patch 6feb37b3b06e9049e20dcf7e23998f92c9c5be9a is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.kernel.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.7
VulDB Temp Score: 5.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 5.5
NVD Vector: 🔍
CNA Base Score: 4.7
CNA Vector (Red Hat, Inc.): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: DeadlockCWE: CWE-833 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Kernel 6.5-rc1
Patch: 6feb37b3b06e9049e20dcf7e23998f92c9c5be9a
Timeline
01/17/2024 🔍01/17/2024 🔍
01/17/2024 🔍
02/10/2024 🔍
Sources
Vendor: kernel.orgAdvisory: 6feb37b3b06e9049e20dcf7e23998f92c9c5be9a
Status: Confirmed
CVE: CVE-2024-0639 (🔍)
GCVE (CVE): GCVE-0-2024-0639
GCVE (VulDB): GCVE-100-251372
Entry
Created: 01/17/2024 12:39Updated: 02/10/2024 17:43
Changes: 01/17/2024 12:39 (45), 02/10/2024 17:36 (2), 02/10/2024 17:43 (21)
Complete: 🔍
Cache ID: 216::103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.