CVE-2024-26901: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak syzbot identified a kernel information leak vulnerability in do_sys_name_to_handle() and issued the following report [1]. [1] "BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline] BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x100 lib/usercopy.c:40 instrument_copy_to_user include/linux/instrumented.h:114 [inline] _copy_to_user+0xbc/0x100 lib/usercopy.c:40 copy_to_user include/linux/uaccess.h:191 [inline] do_sys_name_to_handle fs/fhandle.c:73 [inline] __do_sys_name_to_handle_at fs/fhandle.c:112 [inline] __se_sys_name_to_handle_at+0x949/0xb10 fs/fhandle.c:94 __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94 ... Uninit was created at: slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768 slab_alloc_node mm/slub.c:3478 [inline] __kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517 __do_kmalloc_node mm/slab_common.c:1006 [inline] __kmalloc+0x121/0x3c0 mm/slab_common.c:1020 kmalloc include/linux/slab.h:604 [inline] do_sys_name_to_handle fs/fhandle.c:39 [inline] __do_sys_name_to_handle_at fs/fhandle.c:112 [inline] __se_sys_name_to_handle_at+0x441/0xb10 fs/fhandle.c:94 __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94 ... Bytes 18-19 of 20 are uninitialized Memory access of size 20 starts at ffff888128a46380 Data copied to user address 0000000020000240" Per Chuck Lever's suggestion, use kzalloc() instead of kmalloc() to solve the problem.
AI Analysis
Technical Summary
CVE-2024-26901 is a medium-severity vulnerability identified in the Linux kernel, specifically within the do_sys_name_to_handle() function. The issue arises from improper memory allocation that leads to a kernel information leak. The root cause is the use of kmalloc() for memory allocation without zero-initializing the allocated memory, which results in uninitialized bytes being copied to user space. This behavior was detected by syzbot, a kernel fuzzing tool, which reported a kernel memory sanitizer (KMSAN) warning indicating that 18-19 bytes out of 20 copied to user space were uninitialized. The vulnerability is located in the file fs/fhandle.c, affecting the system call __x64_sys_name_to_handle_at and related functions. The fix involves replacing kmalloc() with kzalloc(), which zeroes the allocated memory, thereby preventing leakage of potentially sensitive kernel memory contents to user space. Although the vulnerability does not allow direct privilege escalation or code execution, leaking kernel memory can provide attackers with information that may facilitate further exploitation or bypass security mechanisms. The CVSS score of 5.3 reflects a network attack vector with low complexity, no privileges required, and no user interaction needed, but with impact limited to availability (due to potential kernel instability) rather than confidentiality or integrity. No known exploits are reported in the wild at this time.
Potential Impact
For European organizations, the impact of CVE-2024-26901 primarily concerns the confidentiality of kernel memory contents. While the vulnerability itself does not directly compromise system integrity or allow remote code execution, the information leak could aid attackers in crafting more sophisticated attacks, such as privilege escalation or bypassing kernel-level security features like KASLR (Kernel Address Space Layout Randomization). This is particularly relevant for organizations running Linux-based servers, cloud infrastructure, or embedded devices that rely on vulnerable kernel versions. The vulnerability could also affect availability if exploitation leads to kernel crashes or instability. Given the widespread use of Linux in European critical infrastructure, government systems, financial institutions, and large enterprises, the potential for indirect impact is significant. Attackers targeting European entities could leverage this vulnerability as part of multi-stage attacks, especially in environments where kernel memory confidentiality is critical. However, the lack of known exploits and the medium severity rating suggest that immediate risk is moderate but should not be ignored.
Mitigation Recommendations
European organizations should promptly apply kernel updates that include the patch replacing kmalloc() with kzalloc() in the do_sys_name_to_handle() function. Since this is a kernel-level vulnerability, updating to the latest stable Linux kernel version provided by their distribution vendors is the most effective mitigation. Organizations using custom or embedded Linux kernels should backport the patch or upgrade accordingly. Additionally, organizations should audit their systems to identify vulnerable kernel versions and prioritize patching on critical assets exposed to untrusted networks. Employing kernel hardening techniques such as Kernel Page Table Isolation (KPTI), enabling kernel address space layout randomization (KASLR), and using security modules like SELinux or AppArmor can reduce the risk of exploitation. Monitoring kernel logs for unusual behavior and employing intrusion detection systems that can detect anomalous system calls may help identify exploitation attempts. Finally, restricting access to systems running vulnerable kernels and minimizing exposure to untrusted users or networks will reduce attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-26901: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak syzbot identified a kernel information leak vulnerability in do_sys_name_to_handle() and issued the following report [1]. [1] "BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline] BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x100 lib/usercopy.c:40 instrument_copy_to_user include/linux/instrumented.h:114 [inline] _copy_to_user+0xbc/0x100 lib/usercopy.c:40 copy_to_user include/linux/uaccess.h:191 [inline] do_sys_name_to_handle fs/fhandle.c:73 [inline] __do_sys_name_to_handle_at fs/fhandle.c:112 [inline] __se_sys_name_to_handle_at+0x949/0xb10 fs/fhandle.c:94 __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94 ... Uninit was created at: slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768 slab_alloc_node mm/slub.c:3478 [inline] __kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517 __do_kmalloc_node mm/slab_common.c:1006 [inline] __kmalloc+0x121/0x3c0 mm/slab_common.c:1020 kmalloc include/linux/slab.h:604 [inline] do_sys_name_to_handle fs/fhandle.c:39 [inline] __do_sys_name_to_handle_at fs/fhandle.c:112 [inline] __se_sys_name_to_handle_at+0x441/0xb10 fs/fhandle.c:94 __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94 ... Bytes 18-19 of 20 are uninitialized Memory access of size 20 starts at ffff888128a46380 Data copied to user address 0000000020000240" Per Chuck Lever's suggestion, use kzalloc() instead of kmalloc() to solve the problem.
AI-Powered Analysis
Technical Analysis
CVE-2024-26901 is a medium-severity vulnerability identified in the Linux kernel, specifically within the do_sys_name_to_handle() function. The issue arises from improper memory allocation that leads to a kernel information leak. The root cause is the use of kmalloc() for memory allocation without zero-initializing the allocated memory, which results in uninitialized bytes being copied to user space. This behavior was detected by syzbot, a kernel fuzzing tool, which reported a kernel memory sanitizer (KMSAN) warning indicating that 18-19 bytes out of 20 copied to user space were uninitialized. The vulnerability is located in the file fs/fhandle.c, affecting the system call __x64_sys_name_to_handle_at and related functions. The fix involves replacing kmalloc() with kzalloc(), which zeroes the allocated memory, thereby preventing leakage of potentially sensitive kernel memory contents to user space. Although the vulnerability does not allow direct privilege escalation or code execution, leaking kernel memory can provide attackers with information that may facilitate further exploitation or bypass security mechanisms. The CVSS score of 5.3 reflects a network attack vector with low complexity, no privileges required, and no user interaction needed, but with impact limited to availability (due to potential kernel instability) rather than confidentiality or integrity. No known exploits are reported in the wild at this time.
Potential Impact
For European organizations, the impact of CVE-2024-26901 primarily concerns the confidentiality of kernel memory contents. While the vulnerability itself does not directly compromise system integrity or allow remote code execution, the information leak could aid attackers in crafting more sophisticated attacks, such as privilege escalation or bypassing kernel-level security features like KASLR (Kernel Address Space Layout Randomization). This is particularly relevant for organizations running Linux-based servers, cloud infrastructure, or embedded devices that rely on vulnerable kernel versions. The vulnerability could also affect availability if exploitation leads to kernel crashes or instability. Given the widespread use of Linux in European critical infrastructure, government systems, financial institutions, and large enterprises, the potential for indirect impact is significant. Attackers targeting European entities could leverage this vulnerability as part of multi-stage attacks, especially in environments where kernel memory confidentiality is critical. However, the lack of known exploits and the medium severity rating suggest that immediate risk is moderate but should not be ignored.
Mitigation Recommendations
European organizations should promptly apply kernel updates that include the patch replacing kmalloc() with kzalloc() in the do_sys_name_to_handle() function. Since this is a kernel-level vulnerability, updating to the latest stable Linux kernel version provided by their distribution vendors is the most effective mitigation. Organizations using custom or embedded Linux kernels should backport the patch or upgrade accordingly. Additionally, organizations should audit their systems to identify vulnerable kernel versions and prioritize patching on critical assets exposed to untrusted networks. Employing kernel hardening techniques such as Kernel Page Table Isolation (KPTI), enabling kernel address space layout randomization (KASLR), and using security modules like SELinux or AppArmor can reduce the risk of exploitation. Monitoring kernel logs for unusual behavior and employing intrusion detection systems that can detect anomalous system calls may help identify exploitation attempts. Finally, restricting access to systems running vulnerable kernels and minimizing exposure to untrusted users or networks will reduce attack surface.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.187Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe3eba
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 8:09:53 PM
Last updated: 8/1/2025, 6:01:43 AM
Views: 12
Related Threats
CVE-2025-9093: Improper Export of Android Application Components in BuzzFeed App
MediumCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.