CVE-2024-47742
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-47742 is a path traversal vulnerability discovered in the Linux kernel's firmware loader component. The vulnerability affects Linux kernel versions from 3.7 through 6.11.2. The issue was identified in the firmware_loader subsystem where certain firmware names containing string components could be passed through from a device or semi-privileged userspace, potentially allowing path traversal attacks (NVD).

Technical details

The vulnerability exists in the firmware loader's handling of firmware file names. The issue arises when firmware names are constructed from device-supplied strings or semi-privileged userspace input, rather than being hardcoded. Specifically, this affects three main paths: the lpfc_sli4_request_firmware_update() function using ModelName from VPD, the nfp_net_fw_find() function using model names from nfp_hwinfo_lookup, and the module_flash_fw_schedule() function accessible via ETHTOOL_MSG_MODULE_FW_FLASH_ACT netlink command. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

If exploited, this vulnerability could allow an attacker to perform path traversal attacks, potentially accessing files outside the intended firmware directory. For example, an attacker could attempt to access sensitive files like '../../../etc/shadow' through maliciously crafted firmware names (Kernel Patch).

Mitigation and workarounds

The vulnerability has been patched by implementing a check that rejects any firmware names containing '..' path components. The fix has been applied across multiple kernel versions and is available in the kernel updates. The patch validates firmware names by checking for '..' sequences surrounded by either '/' characters or at the start/end of the string (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68753HIGH7.8
  • Linux KernelLinux Kernel
  • linux-oem-6.14
NoYesJan 05, 2026
CVE-2025-68756HIGH7.1
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug
NoYesJan 05, 2026
CVE-2025-68764MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-rt-64k-core
NoYesJan 05, 2026
CVE-2025-68758MEDIUM5.5
  • Linux KernelLinux Kernel
  • linux-nvidia-tegra-5.15
NoYesJan 05, 2026
CVE-2025-68762N/AN/A
  • Linux KernelLinux Kernel
  • linux-aws-fips
NoYesJan 05, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management