Skip to main content

CVE-2024-47675: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-47675cvecve-2024-47675
Published: Mon Oct 21 2024 (10/21/2024, 11:53:19 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() If bpf_link_prime() fails, bpf_uprobe_multi_link_attach() goes to the error_free label and frees the array of bpf_uprobe's without calling bpf_uprobe_unregister(). This leaks bpf_uprobe->uprobe and worse, this frees bpf_uprobe->consumer without removing it from the uprobe->consumers list.

AI-Powered Analysis

AILast updated: 06/28/2025, 19:25:36 UTC

Technical Analysis

CVE-2024-47675 is a use-after-free vulnerability identified in the Linux kernel's eBPF (extended Berkeley Packet Filter) subsystem, specifically within the function bpf_uprobe_multi_link_attach(). The vulnerability arises when the function bpf_link_prime() fails during the attachment process of multiple uprobe links. In this failure scenario, bpf_uprobe_multi_link_attach() erroneously jumps to an error handling label (error_free) where it frees an array of bpf_uprobe structures without properly unregistering them via bpf_uprobe_unregister(). This improper cleanup leads to a use-after-free condition because the bpf_uprobe->consumer pointer is freed without being removed from the uprobe->consumers linked list. Consequently, this can cause memory corruption, potentially leading to kernel crashes or arbitrary code execution within the kernel context. The vulnerability affects Linux kernel versions identified by the commit hash 89ae89f53d201143560f1e9ed4bfa62eee34f88e and likely other versions incorporating this code path. No public exploits are currently known in the wild, and no CVSS score has been assigned yet. The vulnerability was reserved on 2024-09-30 and published on 2024-10-21. This flaw is critical because it affects kernel memory management and can be triggered by operations involving eBPF uprobes, which are used for dynamic tracing and monitoring of user-space applications. Attackers with local access or the ability to load eBPF programs could exploit this to destabilize or compromise the system kernel.

Potential Impact

For European organizations, the impact of CVE-2024-47675 can be significant, particularly for those relying on Linux-based infrastructure for critical services, cloud environments, or embedded systems. The vulnerability could allow local attackers or malicious software with the capability to load eBPF uprobes to cause kernel crashes (denial of service) or potentially escalate privileges by executing arbitrary code in kernel space. This undermines system integrity and availability, which are crucial for sectors such as finance, healthcare, telecommunications, and government services prevalent across Europe. Given the widespread use of Linux in servers, cloud platforms, and IoT devices, exploitation could disrupt business operations, lead to data breaches, or compromise sensitive information. The absence of known exploits currently reduces immediate risk, but the vulnerability's nature suggests that sophisticated attackers could develop exploits, especially in environments where eBPF is heavily used for performance monitoring or security tooling. The impact is heightened in multi-tenant cloud environments common in Europe, where a compromised kernel could affect multiple customers.

Mitigation Recommendations

To mitigate CVE-2024-47675, European organizations should prioritize the following actions: 1) Apply the latest Linux kernel patches as soon as they become available from trusted sources or distributions, ensuring the fix for this specific vulnerability is included. 2) Restrict the ability to load or attach eBPF uprobes to trusted users and processes only, using Linux Security Modules (LSMs) like SELinux or AppArmor to enforce strict access controls. 3) Monitor kernel logs and system behavior for anomalies related to eBPF operations, which may indicate attempted exploitation. 4) In environments where immediate patching is not feasible, consider disabling or limiting eBPF functionality temporarily, especially the uprobe attachment features, to reduce the attack surface. 5) Employ runtime security tools that can detect and prevent kernel-level memory corruption attempts. 6) Conduct thorough testing of kernel updates in staging environments to ensure stability before deployment in production. 7) Maintain an inventory of Linux kernel versions in use across the organization to identify and prioritize vulnerable systems for patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-30T16:00:12.937Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9825c4522896dcbe04a8

Added to database: 5/21/2025, 9:08:53 AM

Last enriched: 6/28/2025, 7:25:36 PM

Last updated: 8/18/2025, 11:24:43 PM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats