CVE-2024-26665: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: tunnels: fix out of bounds access when building IPv6 PMTU error If the ICMPv6 error is built from a non-linear skb we get the following splat, BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240 Read of size 4 at addr ffff88811d402c80 by task netperf/820 CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543 ... kasan_report+0xd8/0x110 do_csum+0x220/0x240 csum_partial+0xc/0x20 skb_tunnel_check_pmtu+0xeb9/0x3280 vxlan_xmit_one+0x14c2/0x4080 vxlan_xmit+0xf61/0x5c00 dev_hard_start_xmit+0xfb/0x510 __dev_queue_xmit+0x7cd/0x32a0 br_dev_queue_push_xmit+0x39d/0x6a0 Use skb_checksum instead of csum_partial who cannot deal with non-linear SKBs.
AI Analysis
Technical Summary
CVE-2024-26665 is a vulnerability identified in the Linux kernel affecting the handling of IPv6 Path MTU (PMTU) error messages within tunnel interfaces. Specifically, the issue arises when an ICMPv6 error message is constructed from a non-linear socket buffer (skb). The vulnerability manifests as an out-of-bounds memory access during checksum calculation in the function do_csum, which is called as part of skb_tunnel_check_pmtu processing. The root cause is the use of csum_partial, a checksum function that does not correctly handle non-linear skb structures, leading to a slab-out-of-bounds read error detected by Kernel Address Sanitizer (KASAN). This can cause kernel crashes (BUG reports) and potentially memory corruption. The vulnerability affects Linux kernel versions prior to the fix, which replaces csum_partial with skb_checksum, a function designed to safely handle non-linear skb data. The vulnerability is located in the networking stack, specifically in the tunnel and VXLAN transmission code paths, which are commonly used for network virtualization and overlay networks. No known exploits are reported in the wild as of the publication date, and no CVSS score has been assigned yet. The issue was reserved in February 2024 and published in April 2024, indicating recent discovery and patching activity.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions that utilize IPv6 tunneling or VXLAN for network virtualization, cloud infrastructure, or container networking. Exploitation could lead to kernel crashes causing denial of service (DoS) conditions, impacting availability of critical network services and virtualized environments. In multi-tenant or cloud environments, such disruptions could affect multiple customers or services simultaneously. While no remote code execution or privilege escalation is explicitly indicated, memory corruption risks could theoretically be leveraged for more severe attacks if combined with other vulnerabilities. The impact on confidentiality and integrity is currently considered low to moderate, but availability impact is significant due to potential kernel panics. Given the widespread use of Linux in European data centers, telecom infrastructure, and enterprise servers, unpatched systems could face operational disruptions. Organizations relying on IPv6 and advanced networking features should prioritize patching to maintain service continuity and network reliability.
Mitigation Recommendations
1. Immediate application of the official Linux kernel patch that replaces csum_partial with skb_checksum in the affected code paths is essential. Monitor Linux kernel mailing lists and vendor advisories for updated kernel packages. 2. For organizations using third-party Linux distributions, ensure timely updates from vendors and validate that the fix is included in their kernel releases. 3. Conduct an inventory of systems using IPv6 tunneling and VXLAN features to identify potentially vulnerable hosts. 4. Implement network segmentation and strict access controls to limit exposure of vulnerable systems to untrusted networks, reducing the risk of triggering the vulnerability. 5. Enable kernel crash dump and monitoring tools to detect and analyze any kernel panics related to this vulnerability for rapid incident response. 6. Consider temporary mitigation by disabling IPv6 tunneling or VXLAN features if patching cannot be immediately applied and if operationally feasible. 7. Maintain up-to-date backups and disaster recovery plans to minimize downtime in case of exploitation leading to service disruption.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-26665: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: tunnels: fix out of bounds access when building IPv6 PMTU error If the ICMPv6 error is built from a non-linear skb we get the following splat, BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240 Read of size 4 at addr ffff88811d402c80 by task netperf/820 CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543 ... kasan_report+0xd8/0x110 do_csum+0x220/0x240 csum_partial+0xc/0x20 skb_tunnel_check_pmtu+0xeb9/0x3280 vxlan_xmit_one+0x14c2/0x4080 vxlan_xmit+0xf61/0x5c00 dev_hard_start_xmit+0xfb/0x510 __dev_queue_xmit+0x7cd/0x32a0 br_dev_queue_push_xmit+0x39d/0x6a0 Use skb_checksum instead of csum_partial who cannot deal with non-linear SKBs.
AI-Powered Analysis
Technical Analysis
CVE-2024-26665 is a vulnerability identified in the Linux kernel affecting the handling of IPv6 Path MTU (PMTU) error messages within tunnel interfaces. Specifically, the issue arises when an ICMPv6 error message is constructed from a non-linear socket buffer (skb). The vulnerability manifests as an out-of-bounds memory access during checksum calculation in the function do_csum, which is called as part of skb_tunnel_check_pmtu processing. The root cause is the use of csum_partial, a checksum function that does not correctly handle non-linear skb structures, leading to a slab-out-of-bounds read error detected by Kernel Address Sanitizer (KASAN). This can cause kernel crashes (BUG reports) and potentially memory corruption. The vulnerability affects Linux kernel versions prior to the fix, which replaces csum_partial with skb_checksum, a function designed to safely handle non-linear skb data. The vulnerability is located in the networking stack, specifically in the tunnel and VXLAN transmission code paths, which are commonly used for network virtualization and overlay networks. No known exploits are reported in the wild as of the publication date, and no CVSS score has been assigned yet. The issue was reserved in February 2024 and published in April 2024, indicating recent discovery and patching activity.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions that utilize IPv6 tunneling or VXLAN for network virtualization, cloud infrastructure, or container networking. Exploitation could lead to kernel crashes causing denial of service (DoS) conditions, impacting availability of critical network services and virtualized environments. In multi-tenant or cloud environments, such disruptions could affect multiple customers or services simultaneously. While no remote code execution or privilege escalation is explicitly indicated, memory corruption risks could theoretically be leveraged for more severe attacks if combined with other vulnerabilities. The impact on confidentiality and integrity is currently considered low to moderate, but availability impact is significant due to potential kernel panics. Given the widespread use of Linux in European data centers, telecom infrastructure, and enterprise servers, unpatched systems could face operational disruptions. Organizations relying on IPv6 and advanced networking features should prioritize patching to maintain service continuity and network reliability.
Mitigation Recommendations
1. Immediate application of the official Linux kernel patch that replaces csum_partial with skb_checksum in the affected code paths is essential. Monitor Linux kernel mailing lists and vendor advisories for updated kernel packages. 2. For organizations using third-party Linux distributions, ensure timely updates from vendors and validate that the fix is included in their kernel releases. 3. Conduct an inventory of systems using IPv6 tunneling and VXLAN features to identify potentially vulnerable hosts. 4. Implement network segmentation and strict access controls to limit exposure of vulnerable systems to untrusted networks, reducing the risk of triggering the vulnerability. 5. Enable kernel crash dump and monitoring tools to detect and analyze any kernel panics related to this vulnerability for rapid incident response. 6. Consider temporary mitigation by disabling IPv6 tunneling or VXLAN features if patching cannot be immediately applied and if operationally feasible. 7. Maintain up-to-date backups and disaster recovery plans to minimize downtime in case of exploitation leading to service disruption.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.149Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe4301
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 9:55:21 PM
Last updated: 7/26/2025, 9:14:46 AM
Views: 14
Related Threats
CVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighResearchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
HighCVE-2025-40920: CWE-340 Generation of Predictable Numbers or Identifiers in ETHER Catalyst::Authentication::Credential::HTTP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.