Skip to main content

CVE-2024-26872: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26872cvecve-2024-26872
Published: Wed Apr 17 2024 (04/17/2024, 10:27:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup Upon rare occasions, KASAN reports a use-after-free Write in srpt_refresh_port(). This seems to be because an event handler is registered before the srpt device is fully setup and a race condition upon error may leave a partially setup event handler in place. Instead, only register the event handler after srpt device initialization is complete.

AI-Powered Analysis

AILast updated: 06/29/2025, 19:41:31 UTC

Technical Analysis

CVE-2024-26872 is a use-after-free vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem, specifically within the SRP Target (srpt) driver. The issue arises due to a race condition during the initialization of the srpt device. The vulnerability occurs because the event handler for the srpt device is registered before the device setup is fully complete. In rare cases, this premature registration can lead to a use-after-free write in the srpt_refresh_port() function, as detected by Kernel Address Sanitizer (KASAN). This means that the event handler may reference memory that has already been freed or is in an inconsistent state, potentially causing kernel memory corruption, instability, or crashes. The root cause is a race condition triggered when an error occurs during device initialization, leaving a partially set up event handler active. The fix involves deferring the registration of the event handler until after the srpt device initialization is fully completed, thereby eliminating the race condition and preventing the use-after-free scenario. This vulnerability affects Linux kernel versions containing the specified commit hashes, which correspond to recent kernel development states. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected srpt driver enabled and configured for RDMA operations. RDMA is commonly used in high-performance computing, data centers, and storage networks for low-latency, high-throughput communication. Exploitation of this vulnerability could lead to kernel crashes or memory corruption, resulting in denial of service or potentially enabling privilege escalation if an attacker can manipulate the race condition. This could disrupt critical infrastructure, cloud services, or enterprise storage solutions relying on Linux servers. Given that many European enterprises and research institutions utilize Linux-based systems for their IT infrastructure, the vulnerability could impact service availability and data integrity. However, exploitation complexity is relatively high due to the race condition nature and requirement for specific hardware and configuration (RDMA with srpt). The absence of known exploits reduces immediate risk, but the potential for future exploitation remains, especially in environments where RDMA is prevalent.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched, ensuring the event handler registration occurs only after complete srpt device initialization. System administrators should audit their environments to identify Linux systems using RDMA and the srpt driver, especially in storage and high-performance computing clusters. Disabling the srpt driver or RDMA functionality temporarily on non-critical systems can reduce exposure until patches are applied. Additionally, monitoring kernel logs for unusual KASAN reports or kernel errors related to srpt_refresh_port() can help detect attempts to trigger the vulnerability. Organizations should also implement strict access controls to limit unprivileged user access to systems with RDMA capabilities, as exploitation would likely require local or network access with specific privileges. Finally, maintaining up-to-date kernel versions and subscribing to Linux kernel security advisories will ensure timely awareness and remediation of similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.184Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3e1c

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 7:41:31 PM

Last updated: 7/30/2025, 4:40:15 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats