Skip to main content

CVE-2024-26894: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26894cvecve-2024-26894
Published: Wed Apr 17 2024 (04/17/2024, 10:27:45 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() After unregistering the CPU idle device, the memory associated with it is not freed, leading to a memory leak: unreferenced object 0xffff896282f6c000 (size 1024): comm "swapper/0", pid 1, jiffies 4294893170 hex dump (first 32 bytes): 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 8836a742): [<ffffffff993495ed>] kmalloc_trace+0x29d/0x340 [<ffffffff9972f3b3>] acpi_processor_power_init+0xf3/0x1c0 [<ffffffff9972d263>] __acpi_processor_start+0xd3/0xf0 [<ffffffff9972d2bc>] acpi_processor_start+0x2c/0x50 [<ffffffff99805872>] really_probe+0xe2/0x480 [<ffffffff99805c98>] __driver_probe_device+0x78/0x160 [<ffffffff99805daf>] driver_probe_device+0x1f/0x90 [<ffffffff9980601e>] __driver_attach+0xce/0x1c0 [<ffffffff99803170>] bus_for_each_dev+0x70/0xc0 [<ffffffff99804822>] bus_add_driver+0x112/0x210 [<ffffffff99807245>] driver_register+0x55/0x100 [<ffffffff9aee4acb>] acpi_processor_driver_init+0x3b/0xc0 [<ffffffff990012d1>] do_one_initcall+0x41/0x300 [<ffffffff9ae7c4b0>] kernel_init_freeable+0x320/0x470 [<ffffffff99b231f6>] kernel_init+0x16/0x1b0 [<ffffffff99042e6d>] ret_from_fork+0x2d/0x50 Fix this by freeing the CPU idle device after unregistering it.

AI-Powered Analysis

AILast updated: 06/29/2025, 19:57:01 UTC

Technical Analysis

CVE-2024-26894 is a vulnerability identified in the Linux kernel's ACPI (Advanced Configuration and Power Interface) subsystem, specifically within the processor_idle driver component. The issue arises from a memory leak in the function acpi_processor_power_exit(), which is responsible for cleaning up resources when a CPU idle device is unregistered. The vulnerability occurs because the memory allocated for the CPU idle device is not properly freed after the device is unregistered, leading to an unreferenced object remaining in memory. This leak can cause gradual exhaustion of kernel memory resources, potentially degrading system performance or causing instability over time. The backtrace provided indicates the leak occurs during the driver unregister process, involving kernel functions such as kmalloc_trace and acpi_processor_power_init. The flaw is categorized under CWE-770 (Allocation of Resources Without Limits or Throttling), indicating improper resource management. The vulnerability has a CVSS 3.1 base score of 6.0, reflecting a medium severity level. The vector details indicate that exploitation requires local access (AV:L), low attack complexity (AC:L), privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), with high confidentiality impact (C:H), no integrity impact (I:N), and high availability impact (A:H). No known exploits are reported in the wild as of the publication date (April 17, 2024). The fix involves modifying the kernel code to ensure that the CPU idle device memory is freed after unregistration, preventing the leak. This vulnerability affects Linux kernel versions identified by the provided commit hashes, which correspond to recent kernel releases prior to the patch. Given the Linux kernel's widespread use in servers, desktops, and embedded systems, this vulnerability is relevant to a broad range of environments.

Potential Impact

For European organizations, the impact of CVE-2024-26894 can be significant, especially for those relying heavily on Linux-based infrastructure such as servers, cloud platforms, and embedded devices. The memory leak can lead to gradual degradation of system stability and availability, potentially causing service interruptions or crashes in critical systems if the leak accumulates over time without a reboot or remediation. This is particularly concerning for data centers, telecommunications providers, and industries with high uptime requirements such as finance, healthcare, and manufacturing. The high confidentiality impact in the CVSS vector suggests that the leak might expose sensitive kernel memory contents under certain conditions, although the primary concern is availability. Since exploitation requires local privileged access, the threat is more relevant in environments where attackers or malicious insiders already have elevated privileges or where privilege escalation vulnerabilities exist. European organizations with strict data protection regulations (e.g., GDPR) must consider the risk of confidentiality breaches and service disruptions. Additionally, embedded Linux devices used in critical infrastructure or IoT deployments across Europe could be affected, potentially impacting operational technology systems.

Mitigation Recommendations

1. Immediate application of the official Linux kernel patches that address CVE-2024-26894 is the most effective mitigation. Organizations should track kernel updates from their Linux distribution vendors and apply security updates promptly. 2. For environments where immediate patching is not feasible, implement monitoring of kernel memory usage and system stability to detect signs of memory leaks early. 3. Limit local privileged access to trusted personnel only and enforce strict access controls and auditing to reduce the risk of exploitation by insiders or attackers with local access. 4. Employ kernel hardening techniques such as SELinux or AppArmor to restrict the capabilities of processes and reduce the attack surface. 5. For embedded or IoT devices running affected Linux kernels, coordinate with device vendors for firmware updates or consider device replacement if patches are unavailable. 6. Regularly reboot systems as a temporary measure to clear leaked memory, though this is not a long-term solution. 7. Conduct vulnerability scanning and penetration testing focused on privilege escalation paths that could enable an attacker to gain the required local privileges to exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.186Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3e85

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 7:57:01 PM

Last updated: 8/4/2025, 12:41:39 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats