PatchSiren cyber security CVE debrief
CVE-2024-26880 Linux CVE debrief
CVE-2024-26880 is a Linux kernel device-mapper flaw that can lead to a kernel crash during suspend/resume handling. The underlying issue was an incorrect pairing of postsuspend and resume callbacks: two consecutive postsuspend calls could attempt to remove the same list entry twice, corrupting kernel list state. The fix updates __dm_internal_resume to invoke the table targets’ preresume and resume methods, and handles preresume failure by forcing a suspended state rather than letting the callback sequence become inconsistent.
- Vendor
- Linux
- Product
- CVE-2024-26880
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2024-04-17
- Original CVE updated
- 2026-05-12
- Advisory published
- 2024-04-17
- Advisory updated
- 2026-05-12
Who should care
Linux kernel maintainers, distribution security teams, and administrators of systems that rely on device-mapper, LVM, or snapshot-related workflows should pay attention. The issue is most relevant where dm_mod and dm_snapshot code paths are exercised, especially on kernels in the affected version ranges published by NVD.
Technical summary
The vulnerability is in Linux device-mapper internal suspend/resume handling. According to the kernel fix description, __dm_internal_resume did not call target preresume/resume methods, which left suspend lifecycle callbacks out of sync. That mismatch could cause origin_postsuspend to run twice without a matching resume, leading to list corruption and a BUG in list debugging code. The published CVSS vector indicates local access, low privileges, no user interaction, and high availability impact.
Defensive priority
Medium. The issue is a local, low-privilege crash condition with high availability impact, so it should be prioritized for systems that use device-mapper features or snapshot operations, but it is not described as a confidentiality or integrity compromise.
Recommended defensive actions
- Apply the upstream/stable kernel fixes referenced in the NVD record and vendor patch links.
- Prioritize patched kernels on hosts that use LVM, dm_snapshot, or other device-mapper-based storage workflows.
- Verify kernel versions against the affected ranges listed by NVD, including the 6.8 series before 6.8.2 and the earlier stable branches called out in the record.
- If immediate patching is not possible, reduce exposure by limiting untrusted local access on affected systems and monitoring for kernel crashes in device-mapper suspend/resume paths.
- Track downstream vendor advisories for backport status, especially for enterprise distributions that ship long-term kernel branches.
Evidence notes
The CVE description states that the postsuspend and resume methods were not paired correctly, leading to two consecutive calls to origin_postsuspend and a crash in list deletion logic. The NVD record classifies the issue as CVSS 3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H with CWE-476. NVD also lists affected Linux kernel ranges and references multiple kernel.org patch links plus Debian LTS and Siemens advisories.
Official resources
-
CVE-2024-26880 CVE record
CVE.org
-
CVE-2024-26880 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
Published 2024-04-17T11:15:09.963Z; last modified 2026-05-12T12:16:23.110Z.