Skip to main content

CVE-2024-26851: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26851cvecve-2024-26851
Published: Wed Apr 17 2024 (04/17/2024, 10:17:15 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: Add protection for bmp length out of range UBSAN load reports an exception of BRK#5515 SHIFT_ISSUE:Bitwise shifts that are out of bounds for their data type. vmlinux get_bitmap(b=75) + 712 <net/netfilter/nf_conntrack_h323_asn1.c:0> vmlinux decode_seq(bs=0xFFFFFFD008037000, f=0xFFFFFFD008037018, level=134443100) + 1956 <net/netfilter/nf_conntrack_h323_asn1.c:592> vmlinux decode_choice(base=0xFFFFFFD0080370F0, level=23843636) + 1216 <net/netfilter/nf_conntrack_h323_asn1.c:814> vmlinux decode_seq(f=0xFFFFFFD0080371A8, level=134443500) + 812 <net/netfilter/nf_conntrack_h323_asn1.c:576> vmlinux decode_choice(base=0xFFFFFFD008037280, level=0) + 1216 <net/netfilter/nf_conntrack_h323_asn1.c:814> vmlinux DecodeRasMessage() + 304 <net/netfilter/nf_conntrack_h323_asn1.c:833> vmlinux ras_help() + 684 <net/netfilter/nf_conntrack_h323_main.c:1728> vmlinux nf_confirm() + 188 <net/netfilter/nf_conntrack_proto.c:137> Due to abnormal data in skb->data, the extension bitmap length exceeds 32 when decoding ras message then uses the length to make a shift operation. It will change into negative after several loop. UBSAN load could detect a negative shift as an undefined behaviour and reports exception. So we add the protection to avoid the length exceeding 32. Or else it will return out of range error and stop decoding.

AI-Powered Analysis

AILast updated: 06/29/2025, 19:26:35 UTC

Technical Analysis

CVE-2024-26851 is a vulnerability identified in the Linux kernel's netfilter subsystem, specifically within the nf_conntrack_h323 module responsible for tracking H.323 protocol connections. The issue arises from improper handling of the extension bitmap length during the decoding of RAS (Registration, Admission, and Status) messages. When abnormal or malformed data is present in the skb->data buffer, the extension bitmap length can exceed the expected maximum of 32. This excessive length is then used in a bitwise shift operation, which can result in a negative shift count after multiple iterations. Such negative shifts constitute undefined behavior in C and are detected by the Undefined Behavior Sanitizer (UBSAN) as exceptions. The vulnerability could potentially lead to kernel crashes or denial of service due to the improper handling of out-of-range bitmap lengths. The Linux kernel patch adds protective checks to ensure the bitmap length does not exceed 32, returning an out-of-range error and halting decoding if this condition is violated. This fix prevents the undefined behavior and stabilizes the kernel's handling of malformed H.323 RAS messages. No known exploits are currently reported in the wild, and the vulnerability does not have an assigned CVSS score yet. The affected versions correspond to a specific Linux kernel commit hash, indicating it impacts certain recent kernel builds prior to the patch.

Potential Impact

For European organizations, the impact of CVE-2024-26851 primarily concerns systems running Linux kernels with the vulnerable nf_conntrack_h323 module enabled and actively used. This includes servers and network appliances that perform connection tracking for H.323 protocol traffic, which is commonly used in legacy VoIP and video conferencing systems. Exploitation could lead to kernel crashes or denial of service, disrupting critical communication services and potentially affecting business continuity. While the vulnerability does not appear to allow privilege escalation or remote code execution directly, the resulting instability could be leveraged in targeted denial-of-service attacks against network infrastructure. Organizations relying on Linux-based firewalls, routers, or unified threat management devices that handle H.323 traffic are at higher risk. Given the widespread use of Linux in European data centers, telecom infrastructure, and enterprise environments, unpatched systems could face operational disruptions. However, the lack of known exploits and the requirement for malformed H.323 traffic to trigger the issue somewhat limits immediate risk. Still, the vulnerability warrants prompt attention to prevent potential exploitation in environments where H.323 is in use.

Mitigation Recommendations

1. Apply the official Linux kernel patch that adds protection against out-of-range bitmap lengths in nf_conntrack_h323 as soon as it becomes available from your Linux distribution vendor. 2. If patching is delayed, consider disabling the nf_conntrack_h323 module if H.323 protocol tracking is not required in your environment to eliminate exposure. 3. Implement network-level filtering to block or restrict malformed or suspicious H.323 traffic, especially from untrusted sources, to reduce the likelihood of triggering the vulnerability. 4. Monitor kernel logs and system behavior for unusual exceptions or crashes related to netfilter or nf_conntrack modules to detect potential exploitation attempts. 5. Coordinate with telecom and VoIP system administrators to assess the necessity of H.323 support and explore migration to more modern protocols if feasible, reducing attack surface. 6. Maintain updated intrusion detection/prevention systems (IDS/IPS) with signatures that could detect anomalous H.323 traffic patterns indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.183Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3d8d

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 7:26:35 PM

Last updated: 8/17/2025, 6:33:42 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats