CVE-2024-42112
📋 TL;DR
This CVE describes a use-after-free vulnerability in the Linux kernel's txgbe network driver. When using MSI/INTx interrupts, the driver frees interrupt status block (ISB) memory too early during device removal, allowing continued interrupt handling to read freed memory. This affects Linux systems using the txgbe driver for Intel X550/X552/X557-AT 10GbE network adapters.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, potential privilege escalation via memory corruption, or denial of service through system instability.
Likely Case
System crash or kernel panic when removing network devices, causing service disruption and potential data loss.
If Mitigated
No impact if patched or if txgbe driver is not in use.
🎯 Exploit Status
Requires local access and ability to trigger network device removal. Not directly remote exploitable.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in kernel commits 935124dd5883b5de68dc5a94f582480a10643dc9 and efdc3f54299835ddef23bea651c753c4d467010b
Vendor Advisory: https://git.kernel.org/stable/c/935124dd5883b5de68dc5a94f582480a10643dc9
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing fixes. 2. Check with distribution vendor for backported patches. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable txgbe driver
linuxPrevent loading of vulnerable txgbe driver if not needed
echo 'blacklist txgbe' >> /etc/modprobe.d/blacklist.conf
rmmod txgbe
Avoid device hot removal
linuxPrevent triggering the vulnerability by avoiding removal of affected network devices
🧯 If You Can't Patch
- Monitor system logs for kernel panics or crashes related to network device removal
- Implement strict access controls to prevent unauthorized users from removing network devices
🔍 How to Verify
Check if Vulnerable:
Check if txgbe module is loaded: lsmod | grep txgbe. Check kernel version against patched versions.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits or check with distribution's security advisory. Test network device removal functionality.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- Oops messages in /var/log/kern.log or dmesg
- Network interface removal errors
Network Indicators:
- Sudden network interface disappearance
- Unexpected network service disruption
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "txgbe")