CVE-2024-26863: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access in hsr_get_node() KMSAN reported the following uninit-value access issue [1]: ===================================================== BUG: KMSAN: uninit-value in hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246 hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246 fill_frame_info net/hsr/hsr_forward.c:577 [inline] hsr_forward_skb+0xe12/0x30e0 net/hsr/hsr_forward.c:615 hsr_dev_xmit+0x1a1/0x270 net/hsr/hsr_device.c:223 __netdev_start_xmit include/linux/netdevice.h:4940 [inline] netdev_start_xmit include/linux/netdevice.h:4954 [inline] xmit_one net/core/dev.c:3548 [inline] dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564 __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349 dev_queue_xmit include/linux/netdevice.h:3134 [inline] packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276 packet_snd net/packet/af_packet.c:3087 [inline] packet_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] __sys_sendto+0x735/0xa10 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [inline] __se_sys_sendto net/socket.c:2199 [inline] __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b Uninit was created at: slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768 slab_alloc_node mm/slub.c:3478 [inline] kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560 __alloc_skb+0x318/0x740 net/core/skbuff.c:651 alloc_skb include/linux/skbuff.h:1286 [inline] alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787 packet_alloc_skb net/packet/af_packet.c:2936 [inline] packet_snd net/packet/af_packet.c:3030 [inline] packet_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] __sys_sendto+0x735/0xa10 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [inline] __se_sys_sendto net/socket.c:2199 [inline] __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b CPU: 1 PID: 5033 Comm: syz-executor334 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 ===================================================== If the packet type ID field in the Ethernet header is either ETH_P_PRP or ETH_P_HSR, but it is not followed by an HSR tag, hsr_get_skb_sequence_nr() reads an invalid value as a sequence number. This causes the above issue. This patch fixes the issue by returning NULL if the Ethernet header is not followed by an HSR tag.
AI Analysis
Technical Summary
CVE-2024-26863 is a vulnerability identified in the Linux kernel's High-availability Seamless Redundancy (HSR) network protocol implementation. The issue arises from an uninitialized value access in the function hsr_get_node(), specifically when processing Ethernet frames with packet type IDs ETH_P_PRP or ETH_P_HSR that are not followed by an HSR tag. The kernel's Kernel Memory Sanitizer (KMSAN) detected that in such cases, the function hsr_get_skb_sequence_nr() reads an invalid sequence number value, leading to undefined behavior. This uninitialized memory read occurs because the code does not properly verify the presence of the HSR tag following the Ethernet header before accessing the sequence number. The vulnerability is rooted in the net/hsr/hsr_framereg.c and related source files, affecting the packet forwarding and transmission logic within the HSR network device driver. The patch resolves the issue by adding a check that returns NULL if the Ethernet header is not followed by an HSR tag, preventing the use of uninitialized data. This flaw could potentially be triggered by crafted network packets that exploit the improper validation of HSR frames, leading to kernel memory corruption or information leakage. However, there is no evidence of known exploits in the wild at this time. The vulnerability affects Linux kernel versions including and around commit f266a683a4804dc499efc6c2206ef68efed029d0, and it was publicly disclosed on April 17, 2024. The vulnerability does not have an assigned CVSS score but is recognized by CISA and Linux maintainers.
Potential Impact
For European organizations, the impact of CVE-2024-26863 depends largely on the deployment of Linux systems utilizing the HSR protocol, which is primarily used in industrial and critical infrastructure networks requiring high availability and redundancy, such as power grids, manufacturing plants, and transportation systems. Exploitation could lead to kernel memory corruption, potentially causing system instability, crashes, or information disclosure. This could disrupt critical services or expose sensitive operational data. Given that HSR is used in high-availability environments, any instability could have cascading effects on industrial control systems and network reliability. Although no active exploits are known, the vulnerability could be leveraged by attackers with network access to send specially crafted Ethernet frames to vulnerable hosts, potentially bypassing some security controls due to the low-level nature of the flaw. Confidentiality, integrity, and availability of affected systems could be compromised, impacting operational continuity and safety in sectors critical to European economies and public services.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions that include the patch for CVE-2024-26863 as soon as possible. Specifically, kernel versions incorporating the fix that returns NULL when the Ethernet header is not followed by an HSR tag should be deployed. Network segmentation should be enforced to limit exposure of HSR-enabled devices to untrusted networks, reducing the attack surface. Monitoring network traffic for anomalous or malformed HSR and PRP frames can help detect potential exploitation attempts. Industrial control system operators should validate their Linux-based network devices and embedded systems for this vulnerability and apply vendor-provided patches or kernel updates. Additionally, organizations should implement strict access controls and network filtering at the data link layer to prevent unauthorized injection of crafted Ethernet frames. Regular security audits and penetration testing focusing on network protocol implementations can help identify residual risks. Finally, maintaining up-to-date incident response plans for industrial network disruptions is advisable.
Affected Countries
Germany, France, Italy, Netherlands, Belgium, Sweden, Finland, Norway, United Kingdom
CVE-2024-26863: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access in hsr_get_node() KMSAN reported the following uninit-value access issue [1]: ===================================================== BUG: KMSAN: uninit-value in hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246 hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246 fill_frame_info net/hsr/hsr_forward.c:577 [inline] hsr_forward_skb+0xe12/0x30e0 net/hsr/hsr_forward.c:615 hsr_dev_xmit+0x1a1/0x270 net/hsr/hsr_device.c:223 __netdev_start_xmit include/linux/netdevice.h:4940 [inline] netdev_start_xmit include/linux/netdevice.h:4954 [inline] xmit_one net/core/dev.c:3548 [inline] dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564 __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349 dev_queue_xmit include/linux/netdevice.h:3134 [inline] packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276 packet_snd net/packet/af_packet.c:3087 [inline] packet_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] __sys_sendto+0x735/0xa10 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [inline] __se_sys_sendto net/socket.c:2199 [inline] __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b Uninit was created at: slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768 slab_alloc_node mm/slub.c:3478 [inline] kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560 __alloc_skb+0x318/0x740 net/core/skbuff.c:651 alloc_skb include/linux/skbuff.h:1286 [inline] alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787 packet_alloc_skb net/packet/af_packet.c:2936 [inline] packet_snd net/packet/af_packet.c:3030 [inline] packet_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] __sys_sendto+0x735/0xa10 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [inline] __se_sys_sendto net/socket.c:2199 [inline] __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b CPU: 1 PID: 5033 Comm: syz-executor334 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 ===================================================== If the packet type ID field in the Ethernet header is either ETH_P_PRP or ETH_P_HSR, but it is not followed by an HSR tag, hsr_get_skb_sequence_nr() reads an invalid value as a sequence number. This causes the above issue. This patch fixes the issue by returning NULL if the Ethernet header is not followed by an HSR tag.
AI-Powered Analysis
Technical Analysis
CVE-2024-26863 is a vulnerability identified in the Linux kernel's High-availability Seamless Redundancy (HSR) network protocol implementation. The issue arises from an uninitialized value access in the function hsr_get_node(), specifically when processing Ethernet frames with packet type IDs ETH_P_PRP or ETH_P_HSR that are not followed by an HSR tag. The kernel's Kernel Memory Sanitizer (KMSAN) detected that in such cases, the function hsr_get_skb_sequence_nr() reads an invalid sequence number value, leading to undefined behavior. This uninitialized memory read occurs because the code does not properly verify the presence of the HSR tag following the Ethernet header before accessing the sequence number. The vulnerability is rooted in the net/hsr/hsr_framereg.c and related source files, affecting the packet forwarding and transmission logic within the HSR network device driver. The patch resolves the issue by adding a check that returns NULL if the Ethernet header is not followed by an HSR tag, preventing the use of uninitialized data. This flaw could potentially be triggered by crafted network packets that exploit the improper validation of HSR frames, leading to kernel memory corruption or information leakage. However, there is no evidence of known exploits in the wild at this time. The vulnerability affects Linux kernel versions including and around commit f266a683a4804dc499efc6c2206ef68efed029d0, and it was publicly disclosed on April 17, 2024. The vulnerability does not have an assigned CVSS score but is recognized by CISA and Linux maintainers.
Potential Impact
For European organizations, the impact of CVE-2024-26863 depends largely on the deployment of Linux systems utilizing the HSR protocol, which is primarily used in industrial and critical infrastructure networks requiring high availability and redundancy, such as power grids, manufacturing plants, and transportation systems. Exploitation could lead to kernel memory corruption, potentially causing system instability, crashes, or information disclosure. This could disrupt critical services or expose sensitive operational data. Given that HSR is used in high-availability environments, any instability could have cascading effects on industrial control systems and network reliability. Although no active exploits are known, the vulnerability could be leveraged by attackers with network access to send specially crafted Ethernet frames to vulnerable hosts, potentially bypassing some security controls due to the low-level nature of the flaw. Confidentiality, integrity, and availability of affected systems could be compromised, impacting operational continuity and safety in sectors critical to European economies and public services.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions that include the patch for CVE-2024-26863 as soon as possible. Specifically, kernel versions incorporating the fix that returns NULL when the Ethernet header is not followed by an HSR tag should be deployed. Network segmentation should be enforced to limit exposure of HSR-enabled devices to untrusted networks, reducing the attack surface. Monitoring network traffic for anomalous or malformed HSR and PRP frames can help detect potential exploitation attempts. Industrial control system operators should validate their Linux-based network devices and embedded systems for this vulnerability and apply vendor-provided patches or kernel updates. Additionally, organizations should implement strict access controls and network filtering at the data link layer to prevent unauthorized injection of crafted Ethernet frames. Regular security audits and penetration testing focusing on network protocol implementations can help identify residual risks. Finally, maintaining up-to-date incident response plans for industrial network disruptions is advisable.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.184Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe3dd3
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 7:39:33 PM
Last updated: 8/1/2025, 1:11:23 AM
Views: 11
Related Threats
CVE-2025-8081: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in elemntor Elementor Website Builder – More Than Just a Page Builder
MediumCVE-2025-6253: CWE-862 Missing Authorization in uicore UiCore Elements – Free Elementor widgets and templates
HighCVE-2025-3892: CWE-250: Execution with Unnecessary Privileges in Axis Communications AB AXIS OS
MediumCVE-2025-30027: CWE-1287: Improper Validation of Specified Type of Input in Axis Communications AB AXIS OS
MediumCVE-2025-7622: CWE-918: Server-Side Request Forgery (SSRF) in Axis Communications AB AXIS Camera Station Pro
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.