CVE-2024-42162

7.0 HIGH

📋 TL;DR

This CVE describes an out-of-bounds read vulnerability in the Linux kernel's gve driver when reading NIC statistics. The vulnerability occurs when the driver fails to properly account for stopped queues, potentially accessing invalid memory locations. Systems using affected Linux kernel versions with the gve driver are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE, but patches available for stable kernel branches
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the gve (Google Virtual Ethernet) driver. Cloud environments using Google Cloud Platform may be particularly affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash leading to denial of service, potentially allowing information disclosure through memory access.

🟠

Likely Case

System instability, kernel panic, or denial of service when reading network interface statistics via ethtool.

🟢

If Mitigated

Minor system instability that may cause temporary service interruption until system recovery.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger specific driver operations.
🏢 Internal Only: MEDIUM - Local users or processes with appropriate privileges could trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger statistics reading on affected network interfaces with the gve driver.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel branches via provided git commits

Vendor Advisory: https://git.kernel.org/stable/c/32675d828c8a392e20d5b42375ed112c407e4b62

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Check if gve driver is in use. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable gve driver

linux

Prevent loading of the vulnerable gve driver module

echo 'blacklist gve' >> /etc/modprobe.d/blacklist.conf
rmmod gve

Restrict ethtool access

linux

Limit access to ethtool commands that trigger statistics reading

chmod 750 /sbin/ethtool
setcap cap_net_admin=ep /sbin/ethtool

🧯 If You Can't Patch

  • Monitor systems for kernel panics or crashes related to network statistics
  • Implement strict access controls to prevent unauthorized users from running ethtool commands

🔍 How to Verify

Check if Vulnerable:

Check if gve driver is loaded: lsmod | grep gve. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes patches: grep -i 'gve' /proc/version. Test ethtool statistics reading on gve interfaces.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • OOPs (Out Of Panic) messages in /var/log/kern.log
  • System crash reports

Network Indicators:

  • Sudden loss of network connectivity on gve interfaces
  • Unusual ethtool command patterns

SIEM Query:

source="kern.log" AND ("kernel panic" OR "Oops" OR "gve")

🔗 References

📤 Share & Export