CVE-2024-26707
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-26707 affects the Linux kernel's High-availability Seamless Redundancy (HSR) protocol implementation. The vulnerability was discovered when Syzkaller reported a warning after failing to allocate resources for skb in hsrinitskb(). The issue was identified in January 2024 and affects Linux kernel versions up to 5.10 (Kernel Git).

Technical details

The vulnerability involves a WARNONCE() call in the sendhsrsupervisionframe() function that triggers when resource allocation fails. The issue occurs in the net/hsr/hsrdevice.c file at line 294. The problem was addressed by replacing WARNONCE() with netdevwarnonce() to provide more appropriate warning behavior for both HSR and PRP supervision frame sending functions (Kernel Git).

Impact

The vulnerability could potentially lead to system warnings and logging issues when the HSR protocol fails to allocate resources for supervision frames. This affects the kernel's ability to properly handle resource allocation failures in the HSR networking subsystem (NVD).

Mitigation and workarounds

The vulnerability has been patched in the Linux kernel by replacing the WARNONCE() call with netdevwarnonce() in both sendhsrsupervisionframe() and sendprpsupervision_frame() functions. The fix has been backported to affected stable kernel versions, including the 5.10 series (Debian LTS).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management