CVE-2024-26581

7.8 HIGH

📋 TL;DR

A race condition vulnerability in the Linux kernel's netfilter nft_set_rbtree garbage collection could cause kernel memory corruption. This affects Linux systems using nftables firewall rules with interval sets. Attackers could potentially crash the system or execute arbitrary code with kernel privileges.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches available for multiple stable branches.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when nftables firewall is configured with interval sets. Most default configurations do not use this feature.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to denial of service or potential privilege escalation to kernel-level code execution.

🟠

Likely Case

System crash or instability when nftables with interval sets are actively modified under load.

🟢

If Mitigated

Limited impact if nftables not used or interval sets not configured.

🌐 Internet-Facing: MEDIUM - Requires nftables configuration with interval sets, which is less common than iptables.
🏢 Internal Only: MEDIUM - Same requirements as internet-facing, but internal attackers could exploit if nftables configured.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires race condition timing and specific nftables configuration.

Exploitation requires local access or ability to trigger nftables garbage collection through network traffic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with commits: 10e9cb393136, 1296c110c5a0, 2bab493a5624, 4cee42fcf54f, 60c0c230c6f0

Vendor Advisory: https://git.kernel.org/stable/c/

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel. 3. Verify nftables rules function correctly after update.

🔧 Temporary Workarounds

Disable nftables interval sets

linux

Remove or avoid using interval sets in nftables configuration

nft delete rule <family> <table> <chain> <handle>
nft flush ruleset

Use iptables instead

linux

Replace nftables firewall rules with iptables legacy firewall

systemctl stop nftables
systemctl disable nftables
apt-get install iptables

🧯 If You Can't Patch

  • Disable nftables entirely if not required for system functionality
  • Implement strict network segmentation to limit potential attack surface

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if nftables with interval sets are configured: uname -r && nft list ruleset | grep -i interval

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and test nftables interval set modifications under load

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Oops messages in dmesg
  • nftables rule modification failures

Network Indicators:

  • Unexpected firewall rule changes
  • Network traffic anomalies

SIEM Query:

source="kernel" AND ("Oops" OR "panic" OR "nft")

🔗 References

📤 Share & Export