Skip to main content

CVE-2024-26786: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26786cvecve-2024-26786
Published: Thu Apr 04 2024 (04/04/2024, 08:20:19 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix iopt_access_list_id overwrite bug Syzkaller reported the following WARN_ON: WARNING: CPU: 1 PID: 4738 at drivers/iommu/iommufd/io_pagetable.c:1360 Call Trace: iommufd_access_change_ioas+0x2fe/0x4e0 iommufd_access_destroy_object+0x50/0xb0 iommufd_object_remove+0x2a3/0x490 iommufd_object_destroy_user iommufd_access_destroy+0x71/0xb0 iommufd_test_staccess_release+0x89/0xd0 __fput+0x272/0xb50 __fput_sync+0x4b/0x60 __do_sys_close __se_sys_close __x64_sys_close+0x8b/0x110 do_syscall_x64 The mismatch between the access pointer in the list and the passed-in pointer is resulting from an overwrite of access->iopt_access_list_id, in iopt_add_access(). Called from iommufd_access_change_ioas() when xa_alloc() succeeds but iopt_calculate_iova_alignment() fails. Add a new_id in iopt_add_access() and only update iopt_access_list_id when returning successfully.

AI-Powered Analysis

AILast updated: 06/29/2025, 18:41:13 UTC

Technical Analysis

CVE-2024-26786 is a medium-severity vulnerability in the Linux kernel specifically affecting the iommufd (IOMMU file descriptor) subsystem, which manages input-output memory management unit (IOMMU) page tables. The vulnerability arises from an overwrite bug in the iopt_access_list_id field within the iopt_add_access() function. This bug was identified through a kernel warning (WARN_ON) triggered by Syzkaller, a kernel fuzzing tool, indicating a mismatch between the access pointer in the list and the passed-in pointer. The root cause is that when xa_alloc() succeeds but iopt_calculate_iova_alignment() fails, the iopt_access_list_id is overwritten incorrectly. This leads to inconsistent internal state management of access objects in iommufd, potentially causing a kernel crash or denial of service (DoS). The fix involves introducing a new_id variable in iopt_add_access() and updating iopt_access_list_id only upon successful completion, preventing the overwrite and ensuring consistent state. The vulnerability does not impact confidentiality or integrity but affects availability due to the risk of kernel panic or system instability. Exploitation requires local privileges (low attack vector) and low complexity, with no user interaction needed. The affected versions are specific Linux kernel commits identified by their hashes, indicating this is a recent and targeted fix. No known exploits are reported in the wild at this time.

Potential Impact

For European organizations, the primary impact of CVE-2024-26786 is the potential for local denial of service on Linux systems utilizing the affected kernel versions with iommufd enabled. This could disrupt critical services, especially in environments relying on virtualization, containerization, or hardware isolation features that depend on IOMMU functionality. Systems in data centers, cloud providers, and enterprises running Linux-based infrastructure or embedded devices could experience unexpected crashes or reboots, leading to downtime and operational impact. While the vulnerability does not allow privilege escalation or data compromise, the availability impact could affect service continuity, incident response, and operational costs. Organizations with strict uptime requirements or those operating critical infrastructure should prioritize patching to avoid disruptions. The lack of remote exploitability limits the threat to local users or attackers with some level of system access, but insider threats or compromised accounts could leverage this vulnerability to cause denial of service.

Mitigation Recommendations

European organizations should implement the following specific mitigation steps beyond generic patching advice: 1) Identify all Linux systems running kernel versions containing the affected commits, focusing on those with iommufd enabled or IOMMU features actively used. 2) Prioritize patching these systems with the updated kernel versions that include the fix for CVE-2024-26786, ensuring kernel updates are tested in staging environments to prevent regressions. 3) Restrict local access to trusted users only, as exploitation requires local privileges; enforce strict access controls and monitor for unusual local activity. 4) For environments using virtualization or container platforms, verify that hypervisor and container runtimes are updated and compatible with patched kernels to avoid compatibility issues. 5) Implement kernel crash monitoring and alerting to detect any unexpected kernel panics or warnings related to iommufd, enabling rapid incident response. 6) Review and harden system configurations to minimize the attack surface, including disabling unnecessary kernel modules or features if iommufd is not required. 7) Maintain up-to-date inventory and vulnerability management processes to track kernel versions and associated vulnerabilities continuously.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.178Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3bcb

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 6:41:13 PM

Last updated: 8/14/2025, 11:19:24 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats