Skip to main content

CVE-2024-26643: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26643cvecve-2024-26643
Published: Thu Mar 21 2024 (03/21/2024, 10:43:44 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout While the rhashtable set gc runs asynchronously, a race allows it to collect elements from anonymous sets with timeouts while it is being released from the commit path. Mingi Cho originally reported this issue in a different path in 6.1.x with a pipapo set with low timeouts which is not possible upstream since 7395dfacfff6 ("netfilter: nf_tables: use timestamp to check for set element timeout"). Fix this by setting on the dead flag for anonymous sets to skip async gc in this case. According to 08e4c8c5919f ("netfilter: nf_tables: mark newset as dead on transaction abort"), Florian plans to accelerate abort path by releasing objects via workqueue, therefore, this sets on the dead flag for abort path too.

AI-Powered Analysis

AILast updated: 06/28/2025, 02:25:09 UTC

Technical Analysis

CVE-2024-26643 is a vulnerability identified in the Linux kernel's netfilter subsystem, specifically within the nf_tables component responsible for packet filtering and firewall functionality. The issue arises from a race condition during the asynchronous garbage collection (GC) of rhashtable sets, particularly anonymous sets with timeouts. When such a set is unbound or released, the GC process can concurrently collect elements while the set is still in the process of being released, leading to a use-after-free or similar memory corruption scenario. This race condition occurs because the GC runs asynchronously and does not properly mark the anonymous set as 'dead' during the commit or abort paths, allowing the GC to mistakenly operate on freed or invalid memory. The fix involves setting a 'dead' flag on anonymous sets during unbinding and transaction aborts to prevent the asynchronous GC from processing these sets prematurely. This vulnerability was originally reported by Mingi Cho and addressed by changes that ensure the GC skips dead sets, thereby preventing the race. The affected versions correspond to specific Linux kernel commits prior to the fix, and no known exploits are currently reported in the wild. The vulnerability impacts the core Linux kernel, which is widely used across servers, desktops, and embedded systems, particularly those relying on netfilter for firewall and packet filtering operations.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions with netfilter nf_tables enabled and actively used for network filtering or firewalling. Exploitation could lead to kernel memory corruption, potentially resulting in system crashes (denial of service), privilege escalation, or arbitrary code execution within the kernel context. This could compromise the confidentiality, integrity, and availability of critical systems, especially those exposed to untrusted networks or handling sensitive data. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure, which heavily rely on Linux-based servers and network appliances, could face operational disruptions or security breaches if exploited. The asynchronous nature of the bug and its occurrence during garbage collection make exploitation non-trivial but feasible in targeted attacks. The absence of known exploits suggests limited immediate threat, but the widespread deployment of Linux in Europe and the critical role of netfilter in network security underline the importance of timely patching to mitigate potential risks.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions that include the fix for CVE-2024-26643. This involves applying vendor-supplied patches or upgrading to kernel releases postdating the fix commit. Network administrators should audit their use of nf_tables and netfilter configurations to identify systems running vulnerable kernel versions. Where immediate patching is not feasible, organizations can consider temporary mitigations such as disabling or limiting the use of nf_tables anonymous sets with timeouts, though this may impact firewall functionality. Monitoring kernel logs for unusual netfilter or rhashtable errors can help detect exploitation attempts. Additionally, implementing strict network segmentation and limiting exposure of vulnerable systems to untrusted networks reduces attack surface. Organizations should also maintain robust incident response plans to quickly address potential kernel-level compromises. Collaboration with Linux distribution vendors to ensure timely patch availability and deployment is critical for effective mitigation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.137Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbdda02

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 2:25:09 AM

Last updated: 8/17/2025, 2:29:38 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats