CVE-2024-38385

5.5 MEDIUM

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's interrupt descriptor handling allows an attacker to potentially crash the system or execute arbitrary code. This affects Linux systems where the vulnerable kernel code is present, primarily impacting servers and devices running affected kernel versions. The vulnerability occurs when interrupt descriptors are accessed without proper locking, leading to memory corruption.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches exist for stable kernel trees. Likely affects multiple kernel versions before the fix commits.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: All Linux systems running vulnerable kernel versions are affected regardless of configuration. The vulnerability is in core kernel code.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or potential arbitrary code execution with kernel privileges leading to complete system compromise.

🟠

Likely Case

System instability, kernel crashes, or denial of service conditions affecting system availability.

🟢

If Mitigated

Minimal impact with proper kernel hardening and isolation, though system crashes could still occur.

🌐 Internet-Facing: LOW - Requires local access or ability to execute code on the system first.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this to disrupt services or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to trigger the specific code path. The race condition makes reliable exploitation challenging but possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in kernel commits: 1c7891812d85500ae2ca4051fa5683fcf29930d8, b84a8aba806261d2f759ccedf4a2a6a80a5e55ba, d084aa022f84319f8079e30882cbcbc026af9f21

Vendor Advisory: https://git.kernel.org/stable/c/1c7891812d85500ae2ca4051fa5683fcf29930d8

Restart Required: Yes

Instructions:

1. Update to a kernel version containing the fix commits. 2. Check your distribution's security advisories for specific patched kernel packages. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

No effective workaround

linux

This is a core kernel memory management vulnerability with no configuration-based workaround.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor systems for kernel crashes or instability and have recovery procedures ready

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with distribution security advisories. Vulnerable if running kernel without the fix commits.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update matches patched version from your distribution. Check that kernel contains the fix commits.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System crash logs
  • KASAN reports of use-after-free in irq_find_at_or_after()

SIEM Query:

Search for kernel panic events or system crash reports in system logs

🔗 References

📤 Share & Export