CVE-2024-56650

7.1 HIGH

📋 TL;DR

A memory corruption vulnerability in the Linux kernel's netfilter subsystem allows attackers to trigger a slab-out-of-bounds read via specially crafted LED target rules. This affects Linux systems using netfilter with LED target support, potentially leading to kernel crashes or information disclosure.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches available for multiple stable branches.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if netfilter LED target functionality is used. Most systems don't use LED target rules by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, or potential information disclosure through memory leaks.

🟠

Likely Case

Kernel crash causing system instability and denial of service.

🟢

If Mitigated

No impact if LED target rules are not used or if proper input validation is implemented.

🌐 Internet-Facing: MEDIUM - Requires netfilter rules with LED target, which is less common in internet-facing configurations.
🏢 Internal Only: MEDIUM - Internal attackers with netfilter rule creation privileges could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires CAP_NET_ADMIN or root privileges to create netfilter rules. Discovered via syzbot fuzzing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel branches (commits: 04317f4eb2aad312ad85c1a17ad81fe75f1f9bc7, 147a42bb02de8735cb08476be6d0917987d022c2, 36a9d94dac28beef6b8abba46ba8874320d3e800, a9bcc0b70d9baf3ff005874489a0dc9d023b54c3, ab9916321c95f5280b72b4c5055e269f98627efe)

Vendor Advisory: https://git.kernel.org/stable/c/04317f4eb2aad312ad85c1a17ad81fe75f1f9bc7

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable LED target module

linux

Prevent loading of the LED target module to mitigate vulnerability

echo 'install xt_LED /bin/false' >> /etc/modprobe.d/disable-led.conf
rmmod xt_LED

Restrict netfilter rule creation

linux

Limit users who can create netfilter rules via capabilities

setcap -r /usr/sbin/iptables
setcap -r /usr/sbin/ip6tables

🧯 If You Can't Patch

  • Remove or audit all LED target rules in netfilter configuration
  • Implement strict access controls to prevent unauthorized users from creating netfilter rules

🔍 How to Verify

Check if Vulnerable:

Check if LED target module is loaded: lsmod | grep xt_LED

Check Version:

uname -r

Verify Fix Applied:

Check kernel version against patched versions from kernel git repository

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • KASAN error messages related to strlen or led_tg_check
  • Netfilter rule creation logs

Network Indicators:

  • Unusual netfilter rule modifications

SIEM Query:

source="kernel" AND ("KASAN" OR "slab-out-of-bounds" OR "led_tg_check")

🔗 References

📤 Share & Export