CVE-2024-26815: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check taprio_parse_tc_entry() is not correctly checking TCA_TAPRIO_TC_ENTRY_INDEX attribute: int tc; // Signed value tc = nla_get_u32(tb[TCA_TAPRIO_TC_ENTRY_INDEX]); if (tc >= TC_QOPT_MAX_QUEUE) { NL_SET_ERR_MSG_MOD(extack, "TC entry index out of range"); return -ERANGE; } syzbot reported that it could fed arbitary negative values: UBSAN: shift-out-of-bounds in net/sched/sch_taprio.c:1722:18 shift exponent -2147418108 is negative CPU: 0 PID: 5066 Comm: syz-executor367 Not tainted 6.8.0-rc7-syzkaller-00136-gc8a5c731fd12 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_shift_out_of_bounds+0x3c7/0x420 lib/ubsan.c:386 taprio_parse_tc_entry net/sched/sch_taprio.c:1722 [inline] taprio_parse_tc_entries net/sched/sch_taprio.c:1768 [inline] taprio_change+0xb87/0x57d0 net/sched/sch_taprio.c:1877 taprio_init+0x9da/0xc80 net/sched/sch_taprio.c:2134 qdisc_create+0x9d4/0x1190 net/sched/sch_api.c:1355 tc_modify_qdisc+0xa26/0x1e40 net/sched/sch_api.c:1776 rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6617 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline] netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367 netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667 do_syscall_64+0xf9/0x240 entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7f1b2dea3759 Code: 48 83 c4 28 c3 e8 d7 19 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd4de452f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f1b2def0390 RCX: 00007f1b2dea3759 RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000004 RBP: 0000000000000003 R08: 0000555500000000 R09: 0000555500000000 R10: 0000555500000000 R11: 0000000000000246 R12: 00007ffd4de45340 R13: 00007ffd4de45310 R14: 0000000000000001 R15: 00007ffd4de45340
AI Analysis
Technical Summary
CVE-2024-26815 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically within the taprio (Time-Aware Priority Scheduler) module. The flaw arises from improper validation of the TCA_TAPRIO_TC_ENTRY_INDEX attribute in the taprio_parse_tc_entry() function. This attribute is intended to represent a traffic class index and should be a non-negative unsigned integer within a valid range (less than TC_QOPT_MAX_QUEUE). However, the code incorrectly retrieves this value as a signed integer and fails to properly check for negative values. This oversight allows an attacker to supply arbitrary negative values, leading to undefined behavior such as out-of-bounds shifts, which are detected by the Undefined Behavior Sanitizer (UBSAN) as shift-out-of-bounds errors. The vulnerability was reported by syzbot, an automated kernel fuzzer, and manifests as a kernel runtime error potentially causing crashes or denial of service. The issue occurs during the parsing of traffic control entries when configuring the taprio qdisc (queueing discipline), which is used for deterministic packet scheduling in real-time networking scenarios. Exploitation requires interaction with the kernel's netlink interface to send malformed traffic control messages. While no known exploits are currently reported in the wild, the vulnerability could be leveraged to cause kernel panics or instability, impacting system availability. The flaw affects Linux kernel versions around 6.8.0-rc7 and likely other versions using the vulnerable taprio code. The patch involves adding proper validation to ensure the traffic class index is within the valid unsigned range, preventing negative values from triggering unsafe operations.
Potential Impact
For European organizations, the impact of CVE-2024-26815 primarily concerns systems running Linux kernels with the vulnerable taprio module enabled, especially those utilizing advanced network scheduling for real-time or time-sensitive applications. This includes telecom infrastructure, industrial control systems, cloud service providers, and enterprises relying on Linux-based networking equipment. Exploitation could lead to kernel crashes, resulting in denial of service conditions that disrupt critical network functions or services. In environments where uptime and network determinism are crucial, such as financial services, manufacturing, and public sector networks, this could cause operational interruptions and potential cascading effects on dependent systems. Although the vulnerability does not directly lead to privilege escalation or data leakage, the resulting instability could be exploited as part of a broader attack chain. Given the widespread use of Linux in European data centers and embedded systems, unpatched systems may face increased risk of service degradation or outages. The absence of known active exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits targeting this vulnerability.
Mitigation Recommendations
European organizations should prioritize updating Linux kernels to versions where this vulnerability is patched, specifically applying the fix that adds proper validation of the TCA_TAPRIO_TC_ENTRY_INDEX attribute in the taprio module. Network administrators should audit systems using taprio qdiscs and consider disabling or restricting access to the netlink interface for untrusted users or processes to reduce the attack surface. Implement strict access controls and monitoring on systems that allow traffic control configuration changes, ensuring only authorized personnel can modify qdisc settings. Employ kernel hardening techniques such as enabling kernel lockdown modes and using security modules (e.g., SELinux, AppArmor) to limit the impact of potential kernel faults. Regularly monitor kernel logs for unusual netlink messages or kernel warnings related to taprio operations. For critical infrastructure, consider deploying intrusion detection systems capable of recognizing malformed netlink traffic patterns. Finally, maintain an up-to-date inventory of Linux kernel versions in use and establish rapid patch management processes to address emerging vulnerabilities promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-26815: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check taprio_parse_tc_entry() is not correctly checking TCA_TAPRIO_TC_ENTRY_INDEX attribute: int tc; // Signed value tc = nla_get_u32(tb[TCA_TAPRIO_TC_ENTRY_INDEX]); if (tc >= TC_QOPT_MAX_QUEUE) { NL_SET_ERR_MSG_MOD(extack, "TC entry index out of range"); return -ERANGE; } syzbot reported that it could fed arbitary negative values: UBSAN: shift-out-of-bounds in net/sched/sch_taprio.c:1722:18 shift exponent -2147418108 is negative CPU: 0 PID: 5066 Comm: syz-executor367 Not tainted 6.8.0-rc7-syzkaller-00136-gc8a5c731fd12 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_shift_out_of_bounds+0x3c7/0x420 lib/ubsan.c:386 taprio_parse_tc_entry net/sched/sch_taprio.c:1722 [inline] taprio_parse_tc_entries net/sched/sch_taprio.c:1768 [inline] taprio_change+0xb87/0x57d0 net/sched/sch_taprio.c:1877 taprio_init+0x9da/0xc80 net/sched/sch_taprio.c:2134 qdisc_create+0x9d4/0x1190 net/sched/sch_api.c:1355 tc_modify_qdisc+0xa26/0x1e40 net/sched/sch_api.c:1776 rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6617 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline] netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367 netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667 do_syscall_64+0xf9/0x240 entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7f1b2dea3759 Code: 48 83 c4 28 c3 e8 d7 19 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd4de452f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f1b2def0390 RCX: 00007f1b2dea3759 RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000004 RBP: 0000000000000003 R08: 0000555500000000 R09: 0000555500000000 R10: 0000555500000000 R11: 0000000000000246 R12: 00007ffd4de45340 R13: 00007ffd4de45310 R14: 0000000000000001 R15: 00007ffd4de45340
AI-Powered Analysis
Technical Analysis
CVE-2024-26815 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically within the taprio (Time-Aware Priority Scheduler) module. The flaw arises from improper validation of the TCA_TAPRIO_TC_ENTRY_INDEX attribute in the taprio_parse_tc_entry() function. This attribute is intended to represent a traffic class index and should be a non-negative unsigned integer within a valid range (less than TC_QOPT_MAX_QUEUE). However, the code incorrectly retrieves this value as a signed integer and fails to properly check for negative values. This oversight allows an attacker to supply arbitrary negative values, leading to undefined behavior such as out-of-bounds shifts, which are detected by the Undefined Behavior Sanitizer (UBSAN) as shift-out-of-bounds errors. The vulnerability was reported by syzbot, an automated kernel fuzzer, and manifests as a kernel runtime error potentially causing crashes or denial of service. The issue occurs during the parsing of traffic control entries when configuring the taprio qdisc (queueing discipline), which is used for deterministic packet scheduling in real-time networking scenarios. Exploitation requires interaction with the kernel's netlink interface to send malformed traffic control messages. While no known exploits are currently reported in the wild, the vulnerability could be leveraged to cause kernel panics or instability, impacting system availability. The flaw affects Linux kernel versions around 6.8.0-rc7 and likely other versions using the vulnerable taprio code. The patch involves adding proper validation to ensure the traffic class index is within the valid unsigned range, preventing negative values from triggering unsafe operations.
Potential Impact
For European organizations, the impact of CVE-2024-26815 primarily concerns systems running Linux kernels with the vulnerable taprio module enabled, especially those utilizing advanced network scheduling for real-time or time-sensitive applications. This includes telecom infrastructure, industrial control systems, cloud service providers, and enterprises relying on Linux-based networking equipment. Exploitation could lead to kernel crashes, resulting in denial of service conditions that disrupt critical network functions or services. In environments where uptime and network determinism are crucial, such as financial services, manufacturing, and public sector networks, this could cause operational interruptions and potential cascading effects on dependent systems. Although the vulnerability does not directly lead to privilege escalation or data leakage, the resulting instability could be exploited as part of a broader attack chain. Given the widespread use of Linux in European data centers and embedded systems, unpatched systems may face increased risk of service degradation or outages. The absence of known active exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits targeting this vulnerability.
Mitigation Recommendations
European organizations should prioritize updating Linux kernels to versions where this vulnerability is patched, specifically applying the fix that adds proper validation of the TCA_TAPRIO_TC_ENTRY_INDEX attribute in the taprio module. Network administrators should audit systems using taprio qdiscs and consider disabling or restricting access to the netlink interface for untrusted users or processes to reduce the attack surface. Implement strict access controls and monitoring on systems that allow traffic control configuration changes, ensuring only authorized personnel can modify qdisc settings. Employ kernel hardening techniques such as enabling kernel lockdown modes and using security modules (e.g., SELinux, AppArmor) to limit the impact of potential kernel faults. Regularly monitor kernel logs for unusual netlink messages or kernel warnings related to taprio operations. For critical infrastructure, consider deploying intrusion detection systems capable of recognizing malformed netlink traffic patterns. Finally, maintain an up-to-date inventory of Linux kernel versions in use and establish rapid patch management processes to address emerging vulnerabilities promptly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.180Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe3c93
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 6:56:38 PM
Last updated: 8/17/2025, 2:32:57 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.