PT-2024-1597 · Linux +10 · Linux Kernel +10

Notselwyn

·

Published

2024-01-24

·

Updated

2025-09-20

·

CVE-2024-1086

CVSS v3.1
7.8
VectorAV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

Linux kernel versions 5.14 through 6.6

Description:

A use-after-free vulnerability in the Linux kernel's netfilter: nf tables component can be exploited to achieve local privilege escalation. The nft verdict init() function allows positive values as drop error within the hook verdict, and hence the nf hook slow() function can cause a double free vulnerability when NF DROP is issued with a drop error which resembles NF ACCEPT. This vulnerability can be exploited by an authorized user on the system to elevate their privileges to the level of root. A publicly available exploit exists for this vulnerability, and instances of its exploitation have been recorded.

Recommendations:

To resolve the issue, upgrade past commit f342de4e2f33e0e39165d8639387aa6c19dff660. As a temporary workaround, consider disabling the `nft verdict init()` function until a patch is available. Restrict access to the vulnerable `nf tables` module to minimize the risk of exploitation. Avoid using the `NF DROP` parameter in the affected API endpoint until the issue is resolved.

Exploit

Fix

LPE

Use After Free

Weakness Enumeration

Related Identifiers

ALSA-2024:1607
ALSA-2024:2394
ALSA-2024_1607
ALSA-2024_2394
ALT-PU-2024-1930
ALT-PU-2024-4843
BDU:2024-01187
CESA-2024_1249
CESA-2024_1607
CESA-2024_1614
CVE-2024-1086
DLA-3840-1
DLA-3841-1
ELSA-2024-12255
ELSA-2024-12256
ELSA-2024-12257
ELSA-2024-12258
ELSA-2024-12259
ELSA-2024-12260
ELSA-2024-12265
ELSA-2024-12266
ELSA-2024-12270
ELSA-2024-12271
ELSA-2024-12274
ELSA-2024-12275
ELSA-2024-12378
ELSA-2024-1249
ELSA-2024-1607
ELSA-2024-2394
INFSA-2024_2394
LSN-0102-1
LSN-0103-1
OESA-2024-1175
OESA-2024-1176
OESA-2024-1177
OESA-2024-1178
OESA-2024-1179
OESA-2024-1180
OPENSUSE-SU-2024_0469-1
OPENSUSE-SU-2024_0515-1
RHSA-2024:0930
RHSA-2024:1018
RHSA-2024:1019
RHSA-2024:1249
RHSA-2024:1332
RHSA-2024:1404
RHSA-2024:1607
RHSA-2024:1614
RHSA-2024:2394
RHSA-2024:2697
RHSA-2024:3318
RHSA-2024:3319
RHSA-2024:3414
RHSA-2024:3421
RHSA-2024:3427
RHSA-2024:3528
RHSA-2024:3529
RHSA-2024:3530
RHSA-2024:3805
RHSA-2024:4073
RHSA-2024:4074
RHSA-2024:4075
RHSA-2024_1249
RHSA-2024_1332
RHSA-2024_1607
RHSA-2024_1614
RHSA-2024_2394
RLSA-2024:1607
RLSA-2024:1614
RLSA-2024_1607
RLSA-2024_1614
RXSA-2024:1607
SUSE-SU-2024:0463-1
SUSE-SU-2024:0468-1
SUSE-SU-2024:0469-1
SUSE-SU-2024:0474-1
SUSE-SU-2024:0476-1
SUSE-SU-2024:0478-1
SUSE-SU-2024:0483-1
SUSE-SU-2024:0484-1
SUSE-SU-2024:0514-1
SUSE-SU-2024:0515-1
SUSE-SU-2024:0516-1
SUSE-SU-2024:1358-1
SUSE-SU-2024:1359-1
SUSE-SU-2024:1364-1
SUSE-SU-2024:1373-1
SUSE-SU-2024:1380-1
SUSE-SU-2024:1382-1
SUSE-SU-2024:1386-1
SUSE-SU-2024:1388-1
SUSE-SU-2024:1390-1
SUSE-SU-2024:1400-1
SUSE-SU-2024:1401-1
SUSE-SU-2024:1405-1
SUSE-SU-2024:1406-1
SUSE-SU-2024:1410-1
SUSE-SU-2024:1418-1
SUSE-SU-2024:1493-1
SUSE-SU-2024:1505-1
SUSE-SU-2024:1506-1
SUSE-SU-2024:1537-1
SUSE-SU-2024:1545-1
SUSE-SU-2024:1551-1
SUSE-SU-2024:1554-1
SUSE-SU-2024:1558-1
SUSE-SU-2024:1562-1
SUSE-SU-2024:1580-1
SUSE-SU-2024:1581-1
SUSE-SU-2024:1582-1
SUSE-SU-2024:1596-1
SUSE-SU-2024_0468-1
SUSE-SU-2024_0469-1
SUSE-SU-2024_0474-1
SUSE-SU-2024_0478-1
SUSE-SU-2024_0483-1
SUSE-SU-2024_0484-1
SUSE-SU-2024_0514-1
SUSE-SU-2024_0515-1
SUSE-SU-2024_0516-1
USN-6688-1
USN-6700-1
USN-6700-2
USN-6701-1
USN-6701-2
USN-6701-3
USN-6701-4
USN-6702-1
USN-6702-2
USN-6704-1
USN-6704-2
USN-6704-3
USN-6704-4
USN-6705-1
USN-6707-1
USN-6707-2
USN-6707-3
USN-6707-4
USN-6716-1

Affected Products

Alt Linux
Almalinux
Astra Linux
Centos
Linuxmint
Linux Kernel
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu