CVE-2024-56708
📋 TL;DR
This CVE describes a double-free vulnerability in the Linux kernel's igen6 EDAC (Error Detection and Correction) driver that can cause a segmentation fault during module unload. The vulnerability allows local attackers with module loading privileges to crash the kernel, potentially leading to denial of service. Systems running affected Linux kernel versions with the igen6 EDAC module loaded are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially requiring physical reboot.
Likely Case
System crash or instability when unloading the igen6 EDAC module, requiring reboot to restore functionality.
If Mitigated
No impact if module is not loaded or system is patched.
🎯 Exploit Status
Exploitation requires local access and ability to load/unload kernel modules. The vulnerability triggers during normal module unload operation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 029ac07bb92d2f7502d47a4916f197a8445d83bf, 2a80e710bbc088a2511c159ee4d910456c5f0832, 830cabb61113d92a425dd3038ccedbdfb3c8d079, db60326f2c47b079e36785ace621eb3002db2088, e5c7052664b61f9e2f896702d20552707d0ef60a
Vendor Advisory: https://git.kernel.org/stable/c/
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify igen6 module is not loaded or has been updated.
🔧 Temporary Workarounds
Prevent igen6 module loading
linuxBlacklist the igen6 EDAC module to prevent it from being loaded.
echo 'blacklist igen6' >> /etc/modprobe.d/blacklist-igen6.conf
update-initramfs -u
Unload igen6 module if loaded
linuxRemove the vulnerable module from memory.
rmmod igen6
🧯 If You Can't Patch
- Restrict module loading privileges using kernel.modules_disabled=1 or capabilities.
- Monitor for attempts to load/unload igen6 module and alert on suspicious activity.
🔍 How to Verify
Check if Vulnerable:
Check if igen6 module is loaded: lsmod | grep igen6. If loaded, check kernel version against patched versions.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits and igen6 module can be unloaded without crash: rmmod igen6 (test in safe environment).
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/kern.log or dmesg
- Segmentation fault errors related to igen6 module
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kern.log" AND "panic" AND "igen6" OR source="dmesg" AND "segmentation fault" AND "igen6"
🔗 References
- https://git.kernel.org/stable/c/029ac07bb92d2f7502d47a4916f197a8445d83bf
- https://git.kernel.org/stable/c/2a80e710bbc088a2511c159ee4d910456c5f0832
- https://git.kernel.org/stable/c/830cabb61113d92a425dd3038ccedbdfb3c8d079
- https://git.kernel.org/stable/c/db60326f2c47b079e36785ace621eb3002db2088
- https://git.kernel.org/stable/c/e5c7052664b61f9e2f896702d20552707d0ef60a
- https://git.kernel.org/stable/c/fefaae90398d38a1100ccd73b46ab55ff4610fba
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html