CVE-2024-42112

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's txgbe network driver. When using MSI/INTx interrupts, the driver frees interrupt status block (ISB) memory too early during device removal, allowing continued interrupt handling to read freed memory. This affects Linux systems using the txgbe driver for Intel X550/X552/X557-AT 10GbE network adapters.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with vulnerable txgbe driver (specific version range not provided in CVE, but patches exist for stable branches)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using Intel X550/X552/X557-AT 10GbE network adapters with txgbe driver loaded. Requires MSI/INTx interrupt mode.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, potential privilege escalation via memory corruption, or denial of service through system instability.

🟠

Likely Case

System crash or kernel panic when removing network devices, causing service disruption and potential data loss.

🟢

If Mitigated

No impact if patched or if txgbe driver is not in use.

🌐 Internet-Facing: LOW - Requires local access to trigger device removal; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users or processes with sufficient privileges could trigger the vulnerability, potentially causing system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger network device removal. Not directly remote exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in kernel commits 935124dd5883b5de68dc5a94f582480a10643dc9 and efdc3f54299835ddef23bea651c753c4d467010b

Vendor Advisory: https://git.kernel.org/stable/c/935124dd5883b5de68dc5a94f582480a10643dc9

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing fixes. 2. Check with distribution vendor for backported patches. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable txgbe driver

linux

Prevent loading of vulnerable txgbe driver if not needed

echo 'blacklist txgbe' >> /etc/modprobe.d/blacklist.conf
rmmod txgbe

Avoid device hot removal

linux

Prevent triggering the vulnerability by avoiding removal of affected network devices

🧯 If You Can't Patch

  • Monitor system logs for kernel panics or crashes related to network device removal
  • Implement strict access controls to prevent unauthorized users from removing network devices

🔍 How to Verify

Check if Vulnerable:

Check if txgbe module is loaded: lsmod | grep txgbe. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or check with distribution's security advisory. Test network device removal functionality.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Oops messages in /var/log/kern.log or dmesg
  • Network interface removal errors

Network Indicators:

  • Sudden network interface disappearance
  • Unexpected network service disruption

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "txgbe")

🔗 References

📤 Share & Export