CVE-2024-26782
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-26782 is a double-free vulnerability discovered in the Linux kernel's MPTCP (Multipath TCP) implementation. The issue occurs when an MPTCP server accepts an incoming connection and clones its listener socket, where the pointer to 'inet_opt' for the new socket maintains the same value as the original one. This vulnerability was discovered in April 2024 and affects Linux kernel versions from 5.6 through 6.8-rc1 (NVD).

Technical details

The vulnerability manifests as a double-free condition in the inetsockdestruct function. When the MPTCP server clones a listener socket for incoming connections, it fails to properly duplicate the IP/IPv6 options, leading to the same memory area being freed twice during socket dismantling. The issue has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, Kernel Patch).

Impact

The vulnerability can result in a kernel crash due to double-free memory corruption, potentially leading to denial of service. The issue affects both IPv4 and IPv6 implementations, with similar refcount underflow problems occurring with CALIPSO/IPv6 (Kernel Patch).

Mitigation and workarounds

The issue has been fixed by implementing proper duplication of IP and IPv6 options after socket cloning. The fix involves adding new functions mptcpcopyipoptions and mptcpcopyip6options to ensure proper handling of socket options during cloning operations. The patch has been merged into the mainline kernel and backported to affected stable kernel versions (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management