CVE-2024-47747
📋 TL;DR
This CVE describes a use-after-free vulnerability in the Linux kernel's ether3 network driver caused by a race condition during device removal. An attacker could potentially exploit this to cause kernel crashes, privilege escalation, or arbitrary code execution. Systems running affected Linux kernel versions with the ether3 driver loaded are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, privilege escalation to root, or arbitrary code execution in kernel context.
Likely Case
Kernel crash or system instability causing denial of service.
If Mitigated
No impact if the ether3 driver is not loaded or the system is patched.
🎯 Exploit Status
Exploitation requires local access and ability to manipulate network devices. The race condition makes reliable exploitation challenging.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in stable kernel versions via commits referenced in CVE
Vendor Advisory: https://git.kernel.org/stable/c/1c57d61a43293252ad732007c7070fdb112545fd
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify ether3 driver is not loaded if not needed.
🔧 Temporary Workarounds
Unload ether3 driver
linuxRemove the vulnerable kernel module if not required
sudo rmmod ether3
echo 'blacklist ether3' | sudo tee /etc/modprobe.d/blacklist-ether3.conf
🧯 If You Can't Patch
- Ensure ether3 driver is blacklisted and not loaded
- Restrict local access and module loading capabilities to trusted users only
🔍 How to Verify
Check if Vulnerable:
Check if ether3 module is loaded: lsmod | grep ether3
Check Version:
uname -r
Verify Fix Applied:
Check kernel version is patched and ether3 module is not loaded or blacklisted
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- System crashes related to network driver
- Unexpected ether3 module loading
Network Indicators:
- None - local exploitation only
SIEM Query:
Process where (command_line contains "insmod ether3" OR command_line contains "modprobe ether3")
🔗 References
- https://git.kernel.org/stable/c/1c57d61a43293252ad732007c7070fdb112545fd
- https://git.kernel.org/stable/c/25d559ed2beec9b34045886100dac46d1ad92eba
- https://git.kernel.org/stable/c/338a0582b28e69460df03af50e938b86b4206353
- https://git.kernel.org/stable/c/516dbc6d16637430808c39568cbb6b841d32b55b
- https://git.kernel.org/stable/c/77a77331cef0a219b8dd91361435eeef04cb741c
- https://git.kernel.org/stable/c/822c7bb1f6f8b0331e8d1927151faf8db3b33afd
- https://git.kernel.org/stable/c/b5109b60ee4fcb2f2bb24f589575e10cc5283ad4
- https://git.kernel.org/stable/c/b5a84b6c772564c8359a9a0fbaeb2a2944aa1ee9
- https://git.kernel.org/stable/c/d2abc379071881798d20e2ac1d332ad855ae22f3
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html