
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-26625 affects the Linux kernel's LLC (Logical Link Control) socket implementation. The vulnerability was discovered by syzbot and reported in early 2024, affecting Linux kernel versions from 2.6.35 up to versions before 6.8.0-rc1. The issue stems from a stale sk->sk_wq pointer in a closed LLC socket (Kernel Patch).
The vulnerability is a use-after-free issue in the LLC socket release mechanism. The bug occurs because the protocol was missing a sock_orphan() call during socket release, which was identified following a previous fix in commit ff7b11aa481f that addressed socket release handling. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability can lead to a use-after-free condition, potentially allowing an attacker to cause a denial of service (system crash) or possibly execute arbitrary code with elevated privileges. The issue affects the kernel's network stack, specifically the LLC protocol implementation (NVD).
The vulnerability has been fixed by adding a sock_orphan() call before setting sock->sk to NULL in the LLC socket release path. The fix has been backported to multiple stable kernel versions. Users should update their Linux kernel to a patched version. The fix is included in kernel version 6.8.0-rc1 and has been backported to various stable kernel series (Ubuntu Notice).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."