Lucene search

K
redhatcveRedhat.comRH:CVE-2024-26737
HistoryApr 04, 2024 - 1:52 a.m.

CVE-2024-26737

2024-04-0401:52:29
redhat.com
access.redhat.com
8
linux kernel
bpf_timer_cancel_and_free
bpf_timer_cancel
vulnerability
cve-2024-26737
race condition
uaf
timer->timer

AI Score

6

Confidence

High

EPSS

0

Percentile

15.5%

A use-after-free flaw was found in the Linux kernel’s BPF functionality. This flaw allows a local user to crash the system.

Mitigation

The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.

For the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:

cat /proc/sys/kernel/unprivileged_bpf_disabled

The setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.