CVE-2024-47711

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in the Linux kernel's AF_UNIX socket implementation when handling out-of-band (OOB) data. An attacker could exploit this to cause kernel memory corruption, potentially leading to system crashes or arbitrary code execution. Any system running an affected Linux kernel version with AF_UNIX sockets enabled is vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions before the fix commits 4a7f9a2591a923bdde4bd7eac33490b6ae3b257c and 5aa57d9f2d5311f19434d95b2a81610aa263e23b
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: AF_UNIX sockets are commonly used by various system services and applications for local IPC. The vulnerability is triggered by specific sequences of send/recv operations with MSG_OOB flags.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or potential arbitrary code execution with kernel privileges leading to complete system compromise.

🟠

Likely Case

System instability, crashes, or denial of service affecting applications using AF_UNIX sockets.

🟢

If Mitigated

Limited impact if AF_UNIX sockets are not used or if the system is patched; potential performance degradation if workarounds are applied.

🌐 Internet-Facing: LOW - AF_UNIX sockets are typically used for local inter-process communication and not exposed to the internet.
🏢 Internal Only: MEDIUM - Systems using AF_UNIX sockets for local communication could be vulnerable to local attackers or malicious processes.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM - Requires local access and ability to manipulate AF_UNIX socket communication with specific OOB data sequences.

The vulnerability was discovered through syzkaller fuzzing. Exploitation requires the attacker to have local access and control over AF_UNIX socket communication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 4a7f9a2591a923bdde4bd7eac33490b6ae3b257c and 5aa57d9f2d5311f19434d95b2a81610aa263e23b

Vendor Advisory: https://git.kernel.org/stable/c/4a7f9a2591a923bdde4bd7eac33490b6ae3b257c

Restart Required: Yes

Instructions:

1. Update Linux kernel to a version containing the fix commits. 2. Check with your distribution vendor for specific patched kernel packages. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable AF_UNIX sockets

linux

Remove or disable AF_UNIX socket functionality if not required (not recommended for most systems as it breaks many services).

Not recommended - would require kernel reconfiguration and break system functionality

Restrict socket access

linux

Use SELinux/AppArmor to restrict which processes can create and use AF_UNIX sockets.

Configure appropriate SELinux/AppArmor policies for your applications

🧯 If You Can't Patch

  • Implement strict process isolation and least privilege principles to limit potential impact
  • Monitor system logs for kernel panics or unusual AF_UNIX socket activity

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with patched versions from your distribution. Vulnerable if running kernel before fix commits.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or check with your distribution's security advisory.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN reports of use-after-free in unix_stream_recv_urg
  • System crashes related to AF_UNIX operations

Network Indicators:

  • Not applicable - this is a local IPC vulnerability

SIEM Query:

Search for kernel logs containing 'KASAN: slab-use-after-free' or 'unix_stream_recv_urg'

🔗 References

📤 Share & Export