PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-26861 Linux CVE debrief

CVE-2024-26861 is a Linux kernel WireGuard issue in the receive path where KCSAN reported a data race involving receiving_counter.counter. The upstream fix uses READ_ONCE() and WRITE_ONCE() annotations to mark the concurrent access as intentional. NVD rates the issue as medium severity, with local access required and availability impact as the primary concern.

Vendor
Linux
Product
CVE-2024-26861
CVSS
MEDIUM 4.7
CISA KEV
Not listed in stored evidence
Original CVE published
2024-04-17
Original CVE updated
2026-05-12
Advisory published
2024-04-17
Advisory updated
2026-05-12

Who should care

Linux distribution maintainers, kernel administrators, and operators running WireGuard-enabled systems should review this CVE, especially if they rely on affected Linux kernel release lines or vendor kernels built from them.

Technical summary

The reported issue is a synchronization/data-race problem in drivers/net/wireguard/receive.c. According to the supplied description, KCSAN observed concurrent read and write access to keypair->receiving_counter.counter in wg_packet_decrypt_worker and wg_packet_rx_poll. The fix adds READ_ONCE()/WRITE_ONCE() annotations rather than changing the underlying logic, indicating the race is being explicitly acknowledged in code. NVD lists affected Linux kernel ranges ending before 5.10.214, 5.15.153, 6.1.83, 6.6.23, 6.7.11, and 6.8.2.

Defensive priority

Medium. The issue is local, requires low privileges, and is rated with high availability impact but no confidentiality or integrity impact in the supplied CVSS vector.

Recommended defensive actions

  • Upgrade to a Linux kernel release that includes the upstream/stable fix for your branch.
  • If you maintain a vendor kernel, verify the corresponding backport is present in your distribution advisory stream.
  • Prioritize systems using WireGuard, especially where kernel updates are delayed or custom kernels are deployed.
  • Confirm whether your deployment falls within the affected version ranges listed by NVD and plan patching accordingly.
  • Track downstream notices from your Linux vendor for exact fixed package versions.

Evidence notes

This debrief is based on the supplied CVE description and official references. The CVE was published on 2024-04-17 and later modified on 2026-05-12. The supplied NVD record links multiple upstream stable patch references, and the weakness classification is CWE-362. No exploit code or weaponized reproduction details are included.

Official resources

Publicly disclosed in the CVE record on 2024-04-17. The supplied NVD entry was later modified on 2026-05-12 and includes multiple official patch references plus downstream notices from Debian and Siemens.