Skip to main content

CVE-2024-26862: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26862cvecve-2024-26862
Published: Wed Apr 17 2024 (04/17/2024, 10:27:25 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: packet: annotate data-races around ignore_outgoing ignore_outgoing is read locklessly from dev_queue_xmit_nit() and packet_getsockopt() Add appropriate READ_ONCE()/WRITE_ONCE() annotations. syzbot reported: BUG: KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt write to 0xffff888107804542 of 1 bytes by task 22618 on cpu 0: packet_setsockopt+0xd83/0xfd0 net/packet/af_packet.c:4003 do_sock_setsockopt net/socket.c:2311 [inline] __sys_setsockopt+0x1d8/0x250 net/socket.c:2334 __do_sys_setsockopt net/socket.c:2343 [inline] __se_sys_setsockopt net/socket.c:2340 [inline] __x64_sys_setsockopt+0x66/0x80 net/socket.c:2340 do_syscall_64+0xd3/0x1d0 entry_SYSCALL_64_after_hwframe+0x6d/0x75 read to 0xffff888107804542 of 1 bytes by task 27 on cpu 1: dev_queue_xmit_nit+0x82/0x620 net/core/dev.c:2248 xmit_one net/core/dev.c:3527 [inline] dev_hard_start_xmit+0xcc/0x3f0 net/core/dev.c:3547 __dev_queue_xmit+0xf24/0x1dd0 net/core/dev.c:4335 dev_queue_xmit include/linux/netdevice.h:3091 [inline] batadv_send_skb_packet+0x264/0x300 net/batman-adv/send.c:108 batadv_send_broadcast_skb+0x24/0x30 net/batman-adv/send.c:127 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:392 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:420 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x3f0/0x4b0 net/batman-adv/bat_iv_ogm.c:1700 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x00 -> 0x01 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 27 Comm: kworker/u8:1 Tainted: G W 6.8.0-syzkaller-08073-g480e035fc4c7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet

AI-Powered Analysis

AILast updated: 06/29/2025, 19:27:55 UTC

Technical Analysis

CVE-2024-26862 is a concurrency vulnerability identified in the Linux kernel, specifically related to the packet socket subsystem. The issue arises from a data race condition involving the ignore_outgoing variable, which is accessed without proper synchronization in the functions dev_queue_xmit_nit() and packet_getsockopt(). These functions read ignore_outgoing locklessly, leading to potential inconsistent or corrupted state when multiple threads or CPUs access and modify this variable concurrently. The Kernel Concurrency Sanitizer (KCSAN) detected this race condition during execution, highlighting a write operation in packet_setsockopt() and a concurrent read in dev_queue_xmit_nit(). The root cause is the absence of appropriate memory ordering annotations such as READ_ONCE() and WRITE_ONCE(), which are necessary to ensure atomic and ordered access to shared variables in the kernel. This vulnerability could lead to undefined behavior, including kernel crashes, data corruption, or unpredictable packet processing behavior. The bug was reported by syzbot and affects Linux kernel version 6.8.0-syzkaller-08073-g480e035fc4c7 and potentially other versions with similar code. Although no public exploits are known, the vulnerability affects a core networking component, which is critical for packet transmission and socket options handling in Linux-based systems. The patch involves adding the proper READ_ONCE()/WRITE_ONCE() annotations to the ignore_outgoing variable to prevent concurrent unsynchronized access and eliminate the data race.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected code, especially those handling network traffic at a low level such as routers, firewalls, network appliances, and servers providing network services. Exploitation could lead to kernel instability or crashes, resulting in denial of service (DoS) conditions that disrupt business operations, particularly in sectors reliant on continuous network availability like finance, telecommunications, and critical infrastructure. Although direct privilege escalation or remote code execution is not explicitly indicated, the instability caused by data races in kernel networking code can be leveraged in complex attack chains or cause unexpected failures in security monitoring and network filtering tools. Organizations using Linux-based cloud infrastructure or container platforms may also be affected, as the kernel underpins these environments. The lack of known exploits reduces immediate risk, but the vulnerability's presence in a fundamental kernel subsystem means that once weaponized, it could impact confidentiality, integrity, and availability of network communications and services.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2024-26862. Since this vulnerability involves kernel-level concurrency issues, patching is the most effective mitigation. For environments where immediate patching is not feasible, organizations should: 1) Restrict access to systems running vulnerable kernels to trusted users and networks to reduce the attack surface. 2) Monitor kernel logs and system stability metrics for signs of race condition-induced crashes or anomalies in network packet handling. 3) Employ kernel hardening and concurrency debugging tools where possible to detect and prevent similar issues. 4) For cloud and container environments, ensure host kernels are updated and consider isolating critical workloads to minimize impact. 5) Engage with Linux distribution vendors and security teams to track patch availability and deployment status. 6) Implement network segmentation and strict firewall rules to limit exposure of vulnerable systems to untrusted networks. These steps, combined with timely patching, will reduce the risk of exploitation and operational disruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.184Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3dcb

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 7:27:55 PM

Last updated: 8/1/2025, 7:54:08 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats