CVE-2024-42280

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's mISDN subsystem, specifically in the hfcmulti_tx() function. Attackers could potentially exploit this to cause kernel crashes, privilege escalation, or arbitrary code execution. Systems using mISDN hardware drivers are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches exist for multiple stable branches.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only affects systems with mISDN hardware drivers loaded. Most standard Linux installations do not use mISDN by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or privilege escalation allowing attackers to gain root access and execute arbitrary code.

🟠

Likely Case

Kernel crash causing denial of service, potentially requiring system reboot.

🟢

If Mitigated

Limited impact if mISDN drivers are not loaded or used, with potential for system instability.

🌐 Internet-Facing: LOW - Requires local access or specific hardware interaction.
🏢 Internal Only: MEDIUM - Could be exploited by local users or through other vulnerabilities to escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access or ability to trigger the vulnerable code path through mISDN hardware interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with fixes available (see references)

Vendor Advisory: https://git.kernel.org/stable/c/4d8b642985ae24f4b3656438eb8489834a17bb80

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable mISDN module

linux

Unload mISDN kernel module if not needed

sudo rmmod mISDN_core
sudo rmmod mISDN_dsp
sudo rmmod mISDN_hfcmulti

Blacklist mISDN modules

linux

Prevent mISDN modules from loading at boot

echo 'blacklist mISDN_core' | sudo tee /etc/modprobe.d/blacklist-misdn.conf
echo 'blacklist mISDN_dsp' | sudo tee -a /etc/modprobe.d/blacklist-misdn.conf
echo 'blacklist mISDN_hfcmulti' | sudo tee -a /etc/modprobe.d/blacklist-misdn.conf

🧯 If You Can't Patch

  • Restrict local user access to systems with mISDN hardware
  • Implement strict privilege separation and limit root access

🔍 How to Verify

Check if Vulnerable:

Check if mISDN modules are loaded: lsmod | grep -i misdn

Check Version:

uname -r

Verify Fix Applied:

Check kernel version is patched: uname -r and compare with distribution security advisories

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • OOM killer activity related to kernel memory

Network Indicators:

  • Unusual mISDN hardware activity if monitored

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "general protection fault")

🔗 References

📤 Share & Export