CVE-2024-50293

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's SMC (Shared Memory Communications) implementation allows local attackers to potentially escalate privileges or crash the system. The vulnerability occurs when socket creation fails but leaves a dangling pointer, which could be exploited to execute arbitrary code. This affects Linux systems with SMC enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Versions before the fix commits d293958a8595ba566fb90b99da4d6263e14fee15 and d2cc492124e1f22daa1700f069bcc58788043381
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if SMC (AF_SMC) is enabled/used. Many distributions don't enable SMC by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, kernel panic leading to denial of service, or arbitrary code execution in kernel context.

🟠

Likely Case

Kernel panic causing system crash and denial of service.

🟢

If Mitigated

No impact if SMC is disabled or systems are patched.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system.
🏢 Internal Only: MEDIUM - Local users or compromised accounts could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of kernel exploitation techniques. Found by syzbot fuzzing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits d293958a8595ba566fb90b99da4d6263e14fee15 or d2cc492124e1f22daa1700f069bcc58788043381

Vendor Advisory: https://git.kernel.org/stable/c/d293958a8595ba566fb90b99da4d6263e14fee15

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable SMC module

linux

Prevent loading of SMC kernel module to mitigate vulnerability

echo 'install smc /bin/false' >> /etc/modprobe.d/disable-smc.conf
rmmod smc 2>/dev/null || true

🧯 If You Can't Patch

  • Disable SMC module using modprobe blacklisting
  • Restrict local user access and implement strict privilege separation

🔍 How to Verify

Check if Vulnerable:

Check if SMC module is loaded: lsmod | grep smc AND check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits and SMC module functions correctly if needed

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • OOM killer activity related to SMC
  • System crash dumps

Network Indicators:

  • Unusual SMC socket creation attempts

SIEM Query:

source="kernel" AND ("smc" OR "AF_SMC") AND ("panic" OR "Oops" OR "BUG")

🔗 References

📤 Share & Export