CVE-2024-26865
📋 TL;DR
This is a use-after-free vulnerability in the Linux kernel's RDS-TCP implementation that allows local attackers to cause memory corruption, potentially leading to denial of service or privilege escalation. It affects systems running vulnerable Linux kernel versions with RDS-TCP enabled. The vulnerability occurs when network namespaces are dismantled while request socket timers are still active.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic, system crash, or potential privilege escalation leading to full system compromise.
Likely Case
System instability, kernel crashes, or denial of service affecting network connectivity.
If Mitigated
Minimal impact if RDS-TCP is disabled or systems are properly patched.
🎯 Exploit Status
Exploitation requires local access and specific conditions with network namespace operations. The syzkaller fuzzer found the issue but no public exploit is mentioned.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits 1e9fd5cf8d7f, 2a750d6a5b36, 9905a157048f, 9ceac040506a, or f901ee07853c
Vendor Advisory: https://git.kernel.org/stable/c/1e9fd5cf8d7f487332560f7bb312fc7d416817f3
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable RDS-TCP module
linuxPrevent loading of the vulnerable RDS-TCP kernel module
echo 'install rds_tcp /bin/false' >> /etc/modprobe.d/disable-rds-tcp.conf
rmmod rds_tcp 2>/dev/null || true
Blacklist RDS-TCP module
linuxBlacklist the module to prevent automatic loading
echo 'blacklist rds_tcp' >> /etc/modprobe.d/blacklist-rds-tcp.conf
🧯 If You Can't Patch
- Restrict local user access to prevent exploitation by untrusted users
- Monitor system logs for kernel panic or crash events related to RDS-TCP
🔍 How to Verify
Check if Vulnerable:
Check if RDS-TCP module is loaded: lsmod | grep rds_tcp. If loaded and kernel version is unpatched, system is vulnerable.
Check Version:
uname -r
Verify Fix Applied:
Check kernel version matches patched version from vendor and verify RDS-TCP module is either not loaded or system is patched.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- KASAN use-after-free reports in dmesg
- Ref tracker warnings related to net namespace
Network Indicators:
- Unexpected RDS-TCP connection failures
- Network namespace creation/destruction anomalies
SIEM Query:
source="kernel" AND ("KASAN: slab-use-after-free" OR "ref_tracker: net notrefcnt" OR "inet_csk_reqsk_queue_drop")
🔗 References
- https://git.kernel.org/stable/c/1e9fd5cf8d7f487332560f7bb312fc7d416817f3
- https://git.kernel.org/stable/c/2a750d6a5b365265dbda33330a6188547ddb5c24
- https://git.kernel.org/stable/c/9905a157048f441f1412e7bd13372f4a971d75c6
- https://git.kernel.org/stable/c/9ceac040506a05a30b104b2aa2e9146810704500
- https://git.kernel.org/stable/c/f901ee07853ce97e9f1104c7c898fbbe447f0279
- https://git.kernel.org/stable/c/1e9fd5cf8d7f487332560f7bb312fc7d416817f3
- https://git.kernel.org/stable/c/2a750d6a5b365265dbda33330a6188547ddb5c24
- https://git.kernel.org/stable/c/9905a157048f441f1412e7bd13372f4a971d75c6
- https://git.kernel.org/stable/c/9ceac040506a05a30b104b2aa2e9146810704500
- https://git.kernel.org/stable/c/f901ee07853ce97e9f1104c7c898fbbe447f0279