Skip to main content

CVE-2024-56659: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-56659cvecve-2024-56659
Published: Fri Dec 27 2024 (12/27/2024, 15:06:22 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: lapb: increase LAPB_HEADER_LEN It is unclear if net/lapb code is supposed to be ready for 8021q. We can at least avoid crashes like the following : skbuff: skb_under_panic: text:ffffffff8aabe1f6 len:24 put:20 head:ffff88802824a400 data:ffff88802824a3fe tail:0x16 end:0x140 dev:nr0.2 ------------[ cut here ]------------ kernel BUG at net/core/skbuff.c:206 ! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 5508 Comm: dhcpcd Not tainted 6.12.0-rc7-syzkaller-00144-g66418447d27b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline] RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216 Code: 0d 8d 48 c7 c6 2e 9e 29 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 1a 6f 37 02 48 83 c4 20 90 <0f> 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 RSP: 0018:ffffc90002ddf638 EFLAGS: 00010282 RAX: 0000000000000086 RBX: dffffc0000000000 RCX: 7a24750e538ff600 RDX: 0000000000000000 RSI: 0000000000000201 RDI: 0000000000000000 RBP: ffff888034a86650 R08: ffffffff8174b13c R09: 1ffff920005bbe60 R10: dffffc0000000000 R11: fffff520005bbe61 R12: 0000000000000140 R13: ffff88802824a400 R14: ffff88802824a3fe R15: 0000000000000016 FS: 00007f2a5990d740(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c2631fd CR3: 0000000029504000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> skb_push+0xe5/0x100 net/core/skbuff.c:2636 nr_header+0x36/0x320 net/netrom/nr_dev.c:69 dev_hard_header include/linux/netdevice.h:3148 [inline] vlan_dev_hard_header+0x359/0x480 net/8021q/vlan_dev.c:83 dev_hard_header include/linux/netdevice.h:3148 [inline] lapbeth_data_transmit+0x1f6/0x2a0 drivers/net/wan/lapbether.c:257 lapb_data_transmit+0x91/0xb0 net/lapb/lapb_iface.c:447 lapb_transmit_buffer+0x168/0x1f0 net/lapb/lapb_out.c:149 lapb_establish_data_link+0x84/0xd0 lapb_device_event+0x4e0/0x670 notifier_call_chain+0x19f/0x3e0 kernel/notifier.c:93 __dev_notify_flags+0x207/0x400 dev_change_flags+0xf0/0x1a0 net/core/dev.c:8922 devinet_ioctl+0xa4e/0x1aa0 net/ipv4/devinet.c:1188 inet_ioctl+0x3d7/0x4f0 net/ipv4/af_inet.c:1003 sock_do_ioctl+0x158/0x460 net/socket.c:1227 sock_ioctl+0x626/0x8e0 net/socket.c:1346 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83

AI-Powered Analysis

AILast updated: 06/28/2025, 06:40:54 UTC

Technical Analysis

CVE-2024-56659 is a vulnerability identified in the Linux kernel's networking subsystem, specifically within the LAPB (Link Access Procedure, Balanced) protocol implementation. The issue arises due to insufficient handling of the LAPB header length, particularly in the context of VLAN tagging (802.1Q). The vulnerability manifests as a kernel crash triggered by malformed or unexpected network packets that cause an skb (socket buffer) underflow panic. The provided kernel oops log indicates a BUG triggered in net/core/skbuff.c at line 206, related to skb_under_panic, which is a defensive kernel check that halts execution when the skb buffer's internal pointers become inconsistent or corrupted. This suggests that the LAPB code does not correctly account for VLAN headers, leading to buffer mismanagement and subsequent kernel panic. The crash occurs during packet transmission functions such as lapbeth_data_transmit and lapb_data_transmit, indicating that the vulnerability can be triggered by network traffic processed by the LAPB driver. The vulnerability is resolved by increasing the LAPB_HEADER_LEN to properly accommodate VLAN headers, preventing buffer underflows and kernel crashes. No evidence currently exists of exploitation in the wild, and no CVSS score has been assigned yet. However, the vulnerability can cause denial of service (DoS) conditions by crashing the kernel, potentially impacting system availability. The vulnerability affects Linux kernel versions around 6.12.0-rc7 and likely other versions using the vulnerable LAPB code. LAPB is a protocol used in some WAN and legacy network environments, so the impact depends on the deployment of these components.

Potential Impact

For European organizations, the primary impact of CVE-2024-56659 is the potential for denial of service due to kernel crashes triggered by crafted network packets targeting the LAPB protocol implementation. Organizations running Linux systems with LAPB enabled, especially in network infrastructure roles such as routers, gateways, or specialized WAN devices, could experience service interruptions. This could affect telecommunications providers, ISPs, and enterprises using legacy or specialized networking equipment. The vulnerability does not appear to allow privilege escalation or remote code execution directly but can disrupt critical network services, impacting availability and potentially leading to operational downtime. Given the widespread use of Linux in European data centers, cloud environments, and embedded systems, any systems using the vulnerable LAPB code are at risk. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential DoS attacks. The impact on confidentiality and integrity is minimal, but availability impact can be significant in affected environments.

Mitigation Recommendations

1. Apply the latest Linux kernel updates that include the fix for CVE-2024-56659, specifically those that increase LAPB_HEADER_LEN to handle VLAN headers correctly. 2. Audit network infrastructure and devices to identify any systems running Linux kernels with LAPB enabled, particularly those handling WAN or legacy network protocols. 3. If immediate patching is not possible, consider disabling LAPB protocol support or isolating affected systems from untrusted networks to reduce exposure. 4. Implement network-level filtering to block malformed or suspicious LAPB traffic, especially VLAN-tagged packets that could trigger the vulnerability. 5. Monitor kernel logs and system stability for signs of skb_under_panic or related kernel oops messages that may indicate exploitation attempts. 6. Engage with Linux distribution vendors and infrastructure providers to ensure timely deployment of patches and mitigations. 7. For organizations using Google Cloud or similar environments, verify kernel versions and apply patches as Google Compute Engine hardware was referenced in the crash log.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-27T15:00:39.841Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde497

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 6:40:54 AM

Last updated: 7/31/2025, 10:32:33 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats