CVE-2024-42271

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's IUCV (Inter-User Communication Vehicle) networking subsystem. The flaw occurs when iucv_sock_close() attempts to use a network path that has already been freed by iucv_callback_connrej() in tasklet context, potentially leading to kernel panic. This affects Linux systems using the af_iucv module, particularly those with IUCV networking enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches are available in stable kernel trees. Likely affects multiple kernel versions before the fix commits.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the af_iucv module is loaded and IUCV networking is being used. IUCV is primarily used on IBM System z (mainframe) platforms.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

System crash or instability when IUCV connections are closed under specific timing conditions.

🟢

If Mitigated

No impact if IUCV is not used or the system is patched.

🌐 Internet-Facing: LOW - IUCV is typically used for internal communication between LPARs on IBM mainframes, not internet-facing services.
🏢 Internal Only: MEDIUM - Affects systems using IUCV for internal communication, particularly IBM mainframe environments with Linux guests.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires specific timing conditions and IUCV usage.

Exploitation requires triggering the race condition between process context and tasklet context during IUCV connection closure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees via the provided git commit references.

Vendor Advisory: https://git.kernel.org/stable/c/01437282fd3904810603f3dc98d2cac6b8b6fc84

Restart Required: Yes

Instructions:

1. Update Linux kernel to a version containing the fix commits. 2. For distributions: Use vendor-provided kernel updates. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Unload af_iucv module

linux

Prevent vulnerability by unloading the affected kernel module if IUCV functionality is not required.

sudo rmmod af_iucv

Blacklist af_iucv module

linux

Prevent af_iucv module from loading automatically.

echo 'blacklist af_iucv' | sudo tee /etc/modprobe.d/blacklist-af_iucv.conf

🧯 If You Can't Patch

  • Ensure IUCV networking is not used if not required for system functionality.
  • Monitor systems for kernel panic events and have recovery procedures ready.

🔍 How to Verify

Check if Vulnerable:

Check if af_iucv module is loaded: lsmod | grep af_iucv. If loaded and kernel is unpatched, system may be vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Check kernel version against patched versions or verify the fix commit is present in kernel source.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages mentioning iucv_sock_close, iucv_path_sever, or af_iucv
  • System crash/reboot events

Network Indicators:

  • Unusual IUCV connection failures or disruptions

SIEM Query:

event_source="kernel" AND (message CONTAINS "iucv" OR message CONTAINS "af_iucv") AND (message CONTAINS "panic" OR message CONTAINS "Oops")

🔗 References

📤 Share & Export