CVE-2024-26872

7.0 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's RDMA/srpt subsystem allows attackers to potentially crash the kernel or execute arbitrary code. This affects systems using RDMA (Remote Direct Memory Access) with the srpt driver. The vulnerability occurs due to improper event handler registration timing during device initialization.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches are available in stable kernel trees. Likely affects multiple kernel versions before the fix.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if RDMA/srpt driver is loaded and in use. Many systems don't use RDMA by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential arbitrary code execution with kernel privileges resulting in complete system compromise.

🟠

Likely Case

System instability, kernel crashes, or denial of service affecting RDMA functionality.

🟢

If Mitigated

Limited impact if RDMA is not used or if proper kernel hardening measures are in place.

🌐 Internet-Facing: LOW - RDMA typically operates on internal networks and requires local network access.
🏢 Internal Only: MEDIUM - Requires local network access to RDMA interfaces, but could be exploited by malicious internal actors or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires triggering a race condition during device initialization, making reliable exploitation challenging. Requires RDMA access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel commits provided (e.g., 6413e78086caf7bf15639923740da0d91fdfd090)

Vendor Advisory: https://git.kernel.org/stable/c/6413e78086caf7bf15639923740da0d91fdfd090

Restart Required: Yes

Instructions:

1. Update to a patched Linux kernel version containing the fix. 2. Check your distribution's security advisories for specific patched kernel versions. 3. Reboot the system after kernel update.

🔧 Temporary Workarounds

Disable RDMA/srpt module

linux

Prevent loading of the vulnerable srpt driver if RDMA functionality is not required

echo 'blacklist srpt' >> /etc/modprobe.d/blacklist.conf
rmmod srpt

🧯 If You Can't Patch

  • Restrict RDMA network access using firewall rules to trusted hosts only
  • Monitor system logs for kernel panics or unusual RDMA-related errors

🔍 How to Verify

Check if Vulnerable:

Check if srpt module is loaded: lsmod | grep srpt. If loaded and kernel version is unpatched, system is vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes one of the fix commits: uname -r and check with distribution vendor. Confirm srpt module functions normally after update.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • Use-after-free KASAN reports in dmesg
  • RDMA/srpt initialization errors

Network Indicators:

  • Unusual RDMA traffic patterns from untrusted sources

SIEM Query:

source="kernel" AND ("use-after-free" OR "KASAN" OR "srpt" OR "RDMA")

🔗 References

📤 Share & Export