CVE-2024-26739
📋 TL;DR
This CVE describes a use-after-free vulnerability in the Linux kernel's net/sched: act_mirred component. When redirecting network packets, improper handling of return codes can lead to memory corruption after the packet has been forwarded. This affects all Linux systems using the affected kernel versions with traffic control mirroring enabled.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, potential privilege escalation to root, or remote code execution if combined with other vulnerabilities.
Likely Case
System instability, kernel crashes, or denial of service affecting network functionality.
If Mitigated
Minimal impact if traffic control mirroring is disabled or systems are not processing redirected packets.
🎯 Exploit Status
Exploitation requires local access or ability to trigger specific network conditions. Memory corruption vulnerabilities in kernel space are complex to exploit reliably.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check specific kernel versions containing commits: 0117fe0a4615a7c8d30d6ebcbf87332fbe63e6fd, 166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210, 28cdbbd38a4413b8eff53399b3f872fd4e80db9d, 9d3ef89b6a5e9f2e940de2cef3d543be0be8dec5, e873e8f7d03a2ee5b77fb1a305c782fed98e2754
Vendor Advisory: https://git.kernel.org/stable/c/
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable traffic control mirroring
linuxRemove or disable tc mirroring rules to prevent triggering the vulnerability
tc filter del dev <interface> parent <parent>
tc qdisc del dev <interface> root
🧯 If You Can't Patch
- Disable all traffic control mirroring configurations
- Implement network segmentation to limit exposure of systems using tc mirroring
🔍 How to Verify
Check if Vulnerable:
Check if tc mirroring rules exist: 'tc filter show' and 'tc qdisc show'. If present and kernel is unpatched, system is vulnerable.
Check Version:
uname -r
Verify Fix Applied:
Check kernel version includes the fix commits: 'uname -r' and verify with distribution patch notes.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Oops messages in dmesg
- System crashes related to network traffic
Network Indicators:
- Unexpected network disruptions on systems with tc mirroring
SIEM Query:
Search for kernel panic events or system crashes on Linux hosts with network traffic control configurations
🔗 References
- https://git.kernel.org/stable/c/0117fe0a4615a7c8d30d6ebcbf87332fbe63e6fd
- https://git.kernel.org/stable/c/166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210
- https://git.kernel.org/stable/c/28cdbbd38a4413b8eff53399b3f872fd4e80db9d
- https://git.kernel.org/stable/c/9d3ef89b6a5e9f2e940de2cef3d543be0be8dec5
- https://git.kernel.org/stable/c/e873e8f7d03a2ee5b77fb1a305c782fed98e2754
- https://git.kernel.org/stable/c/f4e294bbdca8ac8757db436fc82214f3882fc7e7
- https://git.kernel.org/stable/c/166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210
- https://git.kernel.org/stable/c/28cdbbd38a4413b8eff53399b3f872fd4e80db9d
- https://git.kernel.org/stable/c/f4e294bbdca8ac8757db436fc82214f3882fc7e7
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html