Use-after-free in Linux kernel's netfilter: nf_tables component
CVE-2024-1085

7.8HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
31 January 2024

Summary

The vulnerability resides in the nf_tables component of the Linux kernel's netfilter subsystem, specifically linked to the nft_setelem_catchall_deactivate() function. This flaw occurs due to inadequate handling of the active state of catch-all set elements across different generations, allowing an attacker to exploit the fault through a double free scenario. Consequently, this poses a significant security risk as it could potentially allow local privilege escalation, enabling an attacker to gain elevated permissions within the system. To address this vulnerability, it is critical to apply the official patch provided beyond commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.

Affected Version(s)

Kernel 5.13 < 6.8

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Lonial Con
.