CVE-2024-26753

7.8 HIGH

📋 TL;DR

This CVE describes a stack overflow vulnerability in the Linux kernel's virtio crypto asymmetric cipher (akcipher) driver. A memory copy operation copies more bytes than the destination buffer can hold, potentially allowing local attackers to corrupt kernel memory. Systems running affected Linux kernel versions with virtio crypto support are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE description; check kernel commit history for exact ranges.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires CONFIG_CRYPTO_DEV_VIRTIO and virtio crypto device support; not all systems may have this enabled.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to root, kernel panic causing system crash, or arbitrary code execution in kernel context.

🟠

Likely Case

Local denial of service through kernel panic or system instability, potentially leading to privilege escalation.

🟢

If Mitigated

Minimal impact if kernel hardening features like stack canaries are enabled and catch the overflow.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system.
🏢 Internal Only: MEDIUM - Local users or compromised services could exploit this for privilege escalation or DoS.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of kernel memory layout; stack overflow vulnerabilities can be challenging to weaponize reliably.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 37077ed16c7793e21b005979d33f8a61565b7e86, 62f361bfea60c6afc3df09c1ad4152e6507f6f47, b0365460e945e1117b47cf7329d86de752daff63, c0ec2a712daf133d9996a8a1b7ee2d4996080363, ef1e47d50324e232d2da484fe55a54274eeb9bc1

Vendor Advisory: https://git.kernel.org/stable/c/37077ed16c7793e21b005979d33f8a61565b7e86

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable virtio crypto module

linux

Prevent loading of vulnerable virtio crypto driver

echo 'blacklist virtio_crypto' >> /etc/modprobe.d/blacklist-virtio-crypto.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict local user access to minimize attack surface
  • Enable kernel hardening features like stack canaries (CONFIG_STACKPROTECTOR)

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if virtio_crypto module is loaded: lsmod | grep virtio_crypto

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and module still functions if needed

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Oops messages in dmesg or /var/log/kern.log

Network Indicators:

  • None - local vulnerability

SIEM Query:

Search for kernel panic events or virtio_crypto module errors in system logs

🔗 References

📤 Share & Export