Critical Linux Kernel Vulnerability: PoC Released for CVE-2024-36904
Allele Security Intelligence has released a proof-of-concept (PoC) for a vulnerability in the Linux kernel’s TCP subsystem. Identified as CVE-2024-36904, this security flaw could potentially allow attackers to perform unauthorized memory operations or launch denial-of-service (DoS) attacks against affected systems.
System administrators are urged to take immediate action as the public availability of this PoC significantly increases the risk of exploitation in the wild.
The vulnerability (CVE-2024-36904) is classified as a Use-After-Free (UAF) issue with a CVSS score of 7.0 as evaluated by Red Hat. The security flaw occurs when the inet_twsk_hashdance() function inserts time-wait sockets into the established hash table before setting the reference count, creating a condition where memory can be accessed after it has been freed.
The published proof-of-concept includes:
While the PoC was specifically tested on Alma Linux 9 (kernel version 5.14.0-362.24.2.el9_3.x86_64), security experts warn that the vulnerability likely affects other Linux kernel versions as well.
With this exploit code now publicly available, malicious actors could:
Red Hat Enterprise Linux 9 has already addressed this vulnerability in kernel version 5.14-427.26.1, released on July 16, 2024. Other Linux distributions may have different patching timelines.
System administrators should take the following actions immediately:
Organizations running Linux systems should:
The Linux kernel serves as the foundation for numerous operating systems including major enterprise distributions like Red Hat Enterprise Linux, Ubuntu, and SUSE, as well as Android. As a critical component of global computing infrastructure, Linux kernel security requires constant vigilance.
The Linux kernel security team works diligently to address vulnerabilities through a coordinated disclosure process, typically providing patches before public disclosure. However, this release of a proof-of-concept before widespread patching highlights the ongoing challenges in balancing security research and system protection.
Source: Allele Security Intelligence