CVE-2024-26625
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-26625 affects the Linux kernel's LLC (Logical Link Control) socket implementation. The vulnerability was discovered by syzbot and reported in early 2024, affecting Linux kernel versions from 2.6.35 up to versions before 6.8.0-rc1. The issue stems from a stale sk->sk_wq pointer in a closed LLC socket (Kernel Patch).

Technical details

The vulnerability is a use-after-free issue in the LLC socket release mechanism. The bug occurs because the protocol was missing a sock_orphan() call during socket release, which was identified following a previous fix in commit ff7b11aa481f that addressed socket release handling. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability can lead to a use-after-free condition, potentially allowing an attacker to cause a denial of service (system crash) or possibly execute arbitrary code with elevated privileges. The issue affects the kernel's network stack, specifically the LLC protocol implementation (NVD).

Mitigation and workarounds

The vulnerability has been fixed by adding a sock_orphan() call before setting sock->sk to NULL in the LLC socket release path. The fix has been backported to multiple stable kernel versions. Users should update their Linux kernel to a patched version. The fix is included in kernel version 6.8.0-rc1 and has been backported to various stable kernel series (Ubuntu Notice).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management