CVE-2024-56569

5.5 MEDIUM

📋 TL;DR

A null pointer dereference vulnerability in the Linux kernel's ftrace subsystem allows local attackers to crash the kernel by writing a malformed module filter command to stack_trace_filter. This affects systems with ftrace enabled and where attackers have write access to the tracing debug filesystem. Kernel crashes lead to denial of service.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE; check kernel commits for exact ranges
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Requires ftrace enabled and write access to /sys/kernel/tracing/stack_trace_filter. Typically only root or users in debugging groups have this access.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker with write access to /sys/kernel/tracing/stack_trace_filter causes kernel panic, resulting in system crash and denial of service.

🟠

Likely Case

Local user or process with debugging privileges triggers kernel crash, causing system instability or downtime.

🟢

If Mitigated

With proper access controls on debugfs and limited user privileges, impact is minimal as only authorized users can trigger the vulnerability.

🌐 Internet-Facing: LOW - Requires local access to debug filesystem; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users with debugging privileges or compromised local processes can cause system crashes.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple command execution triggers the vulnerability

Exploitation requires local access and appropriate permissions to write to debugfs. No authentication bypass needed beyond existing file permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check kernel commits: 19cacabdd5a8487ae566cbecb4d03bcb038a067e, 43ca32ce12888fb0eeb2d74dfc558dea60d3473e, 45af52e7d3b8560f21d139b3759735eead8b1653, 5dabb7af57bc72308a6e2e81a5dd756eef283803, 7ae27880de3482e063fcc1f72d9a298d0d391407

Vendor Advisory: https://git.kernel.org/stable/c/19cacabdd5a8487ae566cbecb4d03bcb038a067e

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Restrict debugfs access

linux

Limit write access to /sys/kernel/tracing/stack_trace_filter to prevent unauthorized users from triggering the vulnerability

chmod 600 /sys/kernel/tracing/stack_trace_filter
chown root:root /sys/kernel/tracing/stack_trace_filter

Disable ftrace if not needed

linux

Disable kernel tracing functionality to eliminate the attack surface

echo 0 > /sys/kernel/tracing/tracing_on

🧯 If You Can't Patch

  • Implement strict access controls on /sys/kernel/tracing directory
  • Monitor for unauthorized access attempts to debugfs and kernel panic events

🔍 How to Verify

Check if Vulnerable:

Check if echo "write*:mod:ext3" > /sys/kernel/tracing/stack_trace_filter causes kernel issues (CAUTION: may crash system)

Check Version:

uname -r

Verify Fix Applied:

After patching, attempt the vulnerable command and verify system remains stable

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Null pointer dereference errors in kernel logs
  • Unauthorized access attempts to /sys/kernel/tracing/

Network Indicators:

  • None - local vulnerability only

SIEM Query:

search 'kernel panic' OR 'null pointer dereference' AND 'ftrace' OR 'stack_trace_filter'

🔗 References

📤 Share & Export