CVE-2024-26872: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup Upon rare occasions, KASAN reports a use-after-free Write in srpt_refresh_port(). This seems to be because an event handler is registered before the srpt device is fully setup and a race condition upon error may leave a partially setup event handler in place. Instead, only register the event handler after srpt device initialization is complete.
AI Analysis
Technical Summary
CVE-2024-26872 is a use-after-free vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem, specifically within the SRP Target (srpt) driver. The issue arises due to a race condition during the initialization of the srpt device. The vulnerability occurs because the event handler for the srpt device is registered before the device setup is fully complete. In rare cases, this premature registration can lead to a use-after-free write in the srpt_refresh_port() function, as detected by Kernel Address Sanitizer (KASAN). This means that the event handler may reference memory that has already been freed or is in an inconsistent state, potentially causing kernel memory corruption, instability, or crashes. The root cause is a race condition triggered when an error occurs during device initialization, leaving a partially set up event handler active. The fix involves deferring the registration of the event handler until after the srpt device initialization is fully completed, thereby eliminating the race condition and preventing the use-after-free scenario. This vulnerability affects Linux kernel versions containing the specified commit hashes, which correspond to recent kernel development states. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected srpt driver enabled and configured for RDMA operations. RDMA is commonly used in high-performance computing, data centers, and storage networks for low-latency, high-throughput communication. Exploitation of this vulnerability could lead to kernel crashes or memory corruption, resulting in denial of service or potentially enabling privilege escalation if an attacker can manipulate the race condition. This could disrupt critical infrastructure, cloud services, or enterprise storage solutions relying on Linux servers. Given that many European enterprises and research institutions utilize Linux-based systems for their IT infrastructure, the vulnerability could impact service availability and data integrity. However, exploitation complexity is relatively high due to the race condition nature and requirement for specific hardware and configuration (RDMA with srpt). The absence of known exploits reduces immediate risk, but the potential for future exploitation remains, especially in environments where RDMA is prevalent.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched, ensuring the event handler registration occurs only after complete srpt device initialization. System administrators should audit their environments to identify Linux systems using RDMA and the srpt driver, especially in storage and high-performance computing clusters. Disabling the srpt driver or RDMA functionality temporarily on non-critical systems can reduce exposure until patches are applied. Additionally, monitoring kernel logs for unusual KASAN reports or kernel errors related to srpt_refresh_port() can help detect attempts to trigger the vulnerability. Organizations should also implement strict access controls to limit unprivileged user access to systems with RDMA capabilities, as exploitation would likely require local or network access with specific privileges. Finally, maintaining up-to-date kernel versions and subscribing to Linux kernel security advisories will ensure timely awareness and remediation of similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Switzerland, Italy
CVE-2024-26872: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Do not register event handler until srpt device is fully setup Upon rare occasions, KASAN reports a use-after-free Write in srpt_refresh_port(). This seems to be because an event handler is registered before the srpt device is fully setup and a race condition upon error may leave a partially setup event handler in place. Instead, only register the event handler after srpt device initialization is complete.
AI-Powered Analysis
Technical Analysis
CVE-2024-26872 is a use-after-free vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem, specifically within the SRP Target (srpt) driver. The issue arises due to a race condition during the initialization of the srpt device. The vulnerability occurs because the event handler for the srpt device is registered before the device setup is fully complete. In rare cases, this premature registration can lead to a use-after-free write in the srpt_refresh_port() function, as detected by Kernel Address Sanitizer (KASAN). This means that the event handler may reference memory that has already been freed or is in an inconsistent state, potentially causing kernel memory corruption, instability, or crashes. The root cause is a race condition triggered when an error occurs during device initialization, leaving a partially set up event handler active. The fix involves deferring the registration of the event handler until after the srpt device initialization is fully completed, thereby eliminating the race condition and preventing the use-after-free scenario. This vulnerability affects Linux kernel versions containing the specified commit hashes, which correspond to recent kernel development states. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected srpt driver enabled and configured for RDMA operations. RDMA is commonly used in high-performance computing, data centers, and storage networks for low-latency, high-throughput communication. Exploitation of this vulnerability could lead to kernel crashes or memory corruption, resulting in denial of service or potentially enabling privilege escalation if an attacker can manipulate the race condition. This could disrupt critical infrastructure, cloud services, or enterprise storage solutions relying on Linux servers. Given that many European enterprises and research institutions utilize Linux-based systems for their IT infrastructure, the vulnerability could impact service availability and data integrity. However, exploitation complexity is relatively high due to the race condition nature and requirement for specific hardware and configuration (RDMA with srpt). The absence of known exploits reduces immediate risk, but the potential for future exploitation remains, especially in environments where RDMA is prevalent.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched, ensuring the event handler registration occurs only after complete srpt device initialization. System administrators should audit their environments to identify Linux systems using RDMA and the srpt driver, especially in storage and high-performance computing clusters. Disabling the srpt driver or RDMA functionality temporarily on non-critical systems can reduce exposure until patches are applied. Additionally, monitoring kernel logs for unusual KASAN reports or kernel errors related to srpt_refresh_port() can help detect attempts to trigger the vulnerability. Organizations should also implement strict access controls to limit unprivileged user access to systems with RDMA capabilities, as exploitation would likely require local or network access with specific privileges. Finally, maintaining up-to-date kernel versions and subscribing to Linux kernel security advisories will ensure timely awareness and remediation of similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.184Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe3e1c
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 7:41:31 PM
Last updated: 7/30/2025, 4:40:15 AM
Views: 12
Related Threats
CVE-2025-9022: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9021: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9020: Use After Free in PX4 PX4-Autopilot
LowCVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin
MediumCVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.