CVE-2024-41010

5.5 MEDIUM

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's BPF subsystem allows local attackers to potentially crash the system or execute arbitrary code. This affects Linux systems with specific network configurations using ingress or clsact qdiscs with shared tc blocks. Attackers need local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific kernel versions with the vulnerable code (check git commits for exact ranges)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using specific network configurations with ingress/clsact qdiscs and shared tc blocks.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution, leading to complete system compromise.

🟠

Likely Case

Kernel panic or system crash causing denial of service.

🟢

If Mitigated

No impact with proper patching or workarounds in place.

🌐 Internet-Facing: LOW - Requires local access to exploit.
🏢 Internal Only: MEDIUM - Local attackers or compromised accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific sequence of network operations and local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits 1cb6f0bae50441f4b4b32a28315853b279c7404e, 230bb13650b0f186f540500fd5f5f7096a822a2a, f61ecf1bd5b562ebfd7d430ccb31619857e80857

Vendor Advisory: https://git.kernel.org/stable/c/1cb6f0bae50441f4b4b32a28315853b279c7404e

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable vulnerable network configurations

linux

Avoid using ingress or clsact qdiscs with shared tc blocks

# Remove ingress qdiscs: tc qdisc del dev <interface> ingress
# Remove clsact qdiscs: tc qdisc del dev <interface> clsact

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable configurations
  • Monitor for unusual network configuration changes and kernel crashes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if using ingress/clsact qdiscs: tc qdisc show

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits and test network functionality

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Use-after-free error messages in dmesg
  • Network subsystem crashes

Network Indicators:

  • Unexpected network configuration changes
  • Network interface failures

SIEM Query:

kernel: *UAF* OR kernel: *use-after-free* OR kernel: *tcx_entry*

🔗 References

📤 Share & Export