CVE-2024-38385
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's interrupt descriptor handling allows an attacker to potentially crash the system or execute arbitrary code. This affects Linux systems where the vulnerable kernel code is present, primarily impacting servers and devices running affected kernel versions. The vulnerability occurs when interrupt descriptors are accessed without proper locking, leading to memory corruption.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic, system crash, or potential arbitrary code execution with kernel privileges leading to complete system compromise.
Likely Case
System instability, kernel crashes, or denial of service conditions affecting system availability.
If Mitigated
Minimal impact with proper kernel hardening and isolation, though system crashes could still occur.
🎯 Exploit Status
Exploitation requires local access and ability to trigger the specific code path. The race condition makes reliable exploitation challenging but possible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in kernel commits: 1c7891812d85500ae2ca4051fa5683fcf29930d8, b84a8aba806261d2f759ccedf4a2a6a80a5e55ba, d084aa022f84319f8079e30882cbcbc026af9f21
Vendor Advisory: https://git.kernel.org/stable/c/1c7891812d85500ae2ca4051fa5683fcf29930d8
Restart Required: Yes
Instructions:
1. Update to a kernel version containing the fix commits. 2. Check your distribution's security advisories for specific patched kernel packages. 3. Reboot the system after kernel update.
🔧 Temporary Workarounds
No effective workaround
linuxThis is a core kernel memory management vulnerability with no configuration-based workaround.
🧯 If You Can't Patch
- Implement strict access controls to limit local user privileges
- Monitor systems for kernel crashes or instability and have recovery procedures ready
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with distribution security advisories. Vulnerable if running kernel without the fix commits.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update matches patched version from your distribution. Check that kernel contains the fix commits.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- System crash logs
- KASAN reports of use-after-free in irq_find_at_or_after()
SIEM Query:
Search for kernel panic events or system crash reports in system logs
🔗 References
- https://git.kernel.org/stable/c/1c7891812d85500ae2ca4051fa5683fcf29930d8
- https://git.kernel.org/stable/c/b84a8aba806261d2f759ccedf4a2a6a80a5e55ba
- https://git.kernel.org/stable/c/d084aa022f84319f8079e30882cbcbc026af9f21
- https://git.kernel.org/stable/c/1c7891812d85500ae2ca4051fa5683fcf29930d8
- https://git.kernel.org/stable/c/b84a8aba806261d2f759ccedf4a2a6a80a5e55ba
- https://git.kernel.org/stable/c/d084aa022f84319f8079e30882cbcbc026af9f21