CVE-2024-50274

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's idpf driver. When monitoring tools query network link settings during a driver reset failure, they can access a freed vport pointer, causing a kernel crash or potential code execution. This affects systems using the idpf driver for Intel Ethernet devices.

💻 Affected Systems

Products:
  • Linux kernel with idpf driver
Versions: Linux kernel versions with vulnerable idpf driver code before the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the idpf driver for Intel Ethernet devices. Requires monitoring tools to query link settings during specific driver reset failure conditions.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential privilege escalation to kernel mode execution if the freed memory is controlled by an attacker.

🟠

Likely Case

System crash or instability when monitoring tools query network interfaces during driver reset scenarios.

🟢

If Mitigated

No impact if the vulnerable driver is not used or if monitoring tools are restricted during driver operations.

🌐 Internet-Facing: LOW - This requires local access or ability to trigger driver resets and monitoring queries.
🏢 Internal Only: MEDIUM - Internal monitoring tools or administrators could trigger this during maintenance or troubleshooting.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering driver reset failures and timing monitoring queries precisely. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 81d2fb4c7c18a3b36ba3e00b9d5b753107472d75 or fa4d906ad0fb63a980a1d586a061c78ea1a345ba

Vendor Advisory: https://git.kernel.org/stable/c/81d2fb4c7c18a3b36ba3e00b9d5b753107472d75

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Rebuild kernel if compiling from source. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable idpf driver

linux

Remove or blacklist the idpf driver if not needed

echo 'blacklist idpf' >> /etc/modprobe.d/blacklist.conf
rmmod idpf

Restrict monitoring tools

linux

Limit network monitoring tools that query link settings

🧯 If You Can't Patch

  • Disable the idpf driver if not required for system functionality
  • Implement strict access controls to prevent unauthorized users from running network monitoring tools

🔍 How to Verify

Check if Vulnerable:

Check if idpf driver is loaded: lsmod | grep idpf. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits: git log --oneline | grep -E '81d2fb4c7c18|fa4d906ad0fb'

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • System crashes during network monitoring
  • Driver reset failure logs

Network Indicators:

  • Unexpected network interface resets
  • Monitoring tool failures

SIEM Query:

event_source:kernel AND (message:"idpf" OR message:"use-after-free" OR message:"general protection fault")

🔗 References

📤 Share & Export