Skip to main content

CVE-2024-26590: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26590cvecve-2024-26590
Published: Thu Feb 22 2024 (02/22/2024, 16:13:34 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: erofs: fix inconsistent per-file compression format EROFS can select compression algorithms on a per-file basis, and each per-file compression algorithm needs to be marked in the on-disk superblock for initialization. However, syzkaller can generate inconsistent crafted images that use an unsupported algorithmtype for specific inodes, e.g. use MicroLZMA algorithmtype even it's not set in `sbi->available_compr_algs`. This can lead to an unexpected "BUG: kernel NULL pointer dereference" if the corresponding decompressor isn't built-in. Fix this by checking against `sbi->available_compr_algs` for each m_algorithmformat request. Incorrect !erofs_sb_has_compr_cfgs preset bitmap is now fixed together since it was harmless previously.

AI-Powered Analysis

AILast updated: 06/29/2025, 20:56:32 UTC

Technical Analysis

CVE-2024-26590 is a medium-severity vulnerability affecting the Linux kernel's EROFS (Enhanced Read-Only File System) implementation. EROFS supports per-file compression algorithms, which are indicated in the on-disk superblock to initialize the appropriate decompressor. The vulnerability arises because the kernel did not properly validate the compression algorithm type for each inode against the set of supported algorithms declared in the superblock's available compression algorithms bitmap. Specifically, a crafted EROFS image generated by the syzkaller fuzzer can specify an unsupported compression algorithm (e.g., MicroLZMA) for certain files even if that algorithm is not enabled in the kernel build. This inconsistency leads to a NULL pointer dereference in the kernel when it attempts to decompress data using a missing decompressor, causing a kernel crash (BUG). The root cause is a lack of validation on the per-file compression algorithm format against the available compression algorithms bitmap. The patch fixes this by enforcing a check against the bitmap for each compression algorithm request, preventing unsupported algorithms from being used. Additionally, it corrects an incorrect preset bitmap that was previously harmless. The vulnerability is classified under CWE-476 (NULL Pointer Dereference) and has a CVSS v3.1 base score of 5.5, reflecting its medium severity. The attack vector is local (AV:L), requiring low privileges (PR:L) but no user interaction (UI:N). The impact is limited to availability (A:H) with no confidentiality or integrity loss. No known exploits are currently reported in the wild.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of denial-of-service (DoS) on systems running vulnerable Linux kernel versions with EROFS enabled and supporting per-file compression. The kernel crash caused by the NULL pointer dereference can lead to system instability or reboot, potentially disrupting critical services. This is particularly relevant for organizations using Linux in embedded systems, network appliances, or servers where EROFS is employed for read-only compressed file systems. Since exploitation requires local access and low privileges, the threat is more significant in multi-user environments or where untrusted users have shell or limited access. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruptions can affect operational continuity. European sectors relying on Linux-based infrastructure for telecommunications, industrial control, or cloud services could experience service interruptions if vulnerable kernels are exploited. However, the absence of known active exploits and the medium severity score suggest the threat is moderate but should not be ignored.

Mitigation Recommendations

European organizations should take the following specific actions to mitigate this vulnerability: 1) Identify and inventory Linux systems running kernel versions prior to the patch release date (February 22, 2024) that have EROFS enabled, especially those using per-file compression features. 2) Apply the official Linux kernel patches or upgrade to a kernel version that includes the fix for CVE-2024-26590 as soon as possible. 3) For embedded or specialized devices where kernel upgrades are challenging, consider disabling EROFS or per-file compression features if not strictly required. 4) Limit local access privileges to trusted users only, reducing the risk of local exploitation by unprivileged users. 5) Monitor system logs and kernel crash reports for signs of NULL pointer dereferences or unexpected reboots that could indicate attempted exploitation. 6) Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely remediation. 7) For environments using fuzz testing tools like syzkaller, ensure that testing environments are isolated to prevent crafted images from reaching production systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.126Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe40e5

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 8:56:32 PM

Last updated: 8/12/2025, 7:14:08 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats