CVE-2024-26622
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-26622 is a vulnerability discovered in the Linux kernel's TOMOYO module, specifically in the tomoyowritecontrol() function. The vulnerability was disclosed on March 4, 2024, affecting Linux kernel versions from 3.1 through various 5.x and 6.x branches up to versions 5.10.212, 5.15.151, 6.1.81, 6.6.21, and 6.7.9 (NVD).

Technical details

The vulnerability is a Use-After-Free (UAF) write bug in the tomoyowritecontrol() function within the security/tomoyo/common.c file. The issue occurs because the function updates head->write_buf when write() of long lines is requested without proper synchronization. The CVSS v3.1 base score is 7.8 (High), with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access requirements but high impact potential (NVD).

Impact

The vulnerability can lead to use-after-free-write and double-free problems when concurrent write() requests are made. This could potentially result in privilege escalation, system crashes, or other security implications in the Linux kernel (NVD).

Mitigation and workarounds

The vulnerability has been patched in the Linux kernel. The fix involves modifying the tomoyowritecontrol() function to fetch head->writebuf after head->iosem is held, ensuring proper synchronization. Multiple Linux distributions have released security updates to address this vulnerability (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management