CVE-2024-56708

7.8 HIGH

📋 TL;DR

This CVE describes a double-free vulnerability in the Linux kernel's igen6 EDAC (Error Detection and Correction) driver that can cause a segmentation fault during module unload. The vulnerability allows local attackers with module loading privileges to crash the kernel, potentially leading to denial of service. Systems running affected Linux kernel versions with the igen6 EDAC module loaded are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE description; check kernel commit references for exact ranges.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when igen6 EDAC module is loaded. Many systems may not use this specific EDAC driver.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially requiring physical reboot.

🟠

Likely Case

System crash or instability when unloading the igen6 EDAC module, requiring reboot to restore functionality.

🟢

If Mitigated

No impact if module is not loaded or system is patched.

🌐 Internet-Facing: LOW - Requires local access and module loading privileges.
🏢 Internal Only: MEDIUM - Local attackers with module loading privileges can cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to load/unload kernel modules. The vulnerability triggers during normal module unload operation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 029ac07bb92d2f7502d47a4916f197a8445d83bf, 2a80e710bbc088a2511c159ee4d910456c5f0832, 830cabb61113d92a425dd3038ccedbdfb3c8d079, db60326f2c47b079e36785ace621eb3002db2088, e5c7052664b61f9e2f896702d20552707d0ef60a

Vendor Advisory: https://git.kernel.org/stable/c/

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify igen6 module is not loaded or has been updated.

🔧 Temporary Workarounds

Prevent igen6 module loading

linux

Blacklist the igen6 EDAC module to prevent it from being loaded.

echo 'blacklist igen6' >> /etc/modprobe.d/blacklist-igen6.conf
update-initramfs -u

Unload igen6 module if loaded

linux

Remove the vulnerable module from memory.

rmmod igen6

🧯 If You Can't Patch

  • Restrict module loading privileges using kernel.modules_disabled=1 or capabilities.
  • Monitor for attempts to load/unload igen6 module and alert on suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check if igen6 module is loaded: lsmod | grep igen6. If loaded, check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits and igen6 module can be unloaded without crash: rmmod igen6 (test in safe environment).

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • Segmentation fault errors related to igen6 module

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kern.log" AND "panic" AND "igen6" OR source="dmesg" AND "segmentation fault" AND "igen6"

🔗 References

📤 Share & Export