A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.

We recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-16860 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability. We recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.
Ubuntu USN Ubuntu USN USN-6688-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6704-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6704-2 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-6704-3 Linux kernel (Oracle) vulnerabilities
Ubuntu USN Ubuntu USN USN-6704-4 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6705-1 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-6707-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6707-2 Linux kernel (ARM laptop) vulnerabilities
Ubuntu USN Ubuntu USN USN-6707-3 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-6707-4 Linux kernel (Azure) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 29 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-05-29T15:03:59.158Z

Reserved: 2024-01-30T20:04:08.623Z

Link: CVE-2024-1085

cve-icon Vulnrichment

Updated: 2024-08-01T18:26:30.459Z

cve-icon NVD

Status : Modified

Published: 2024-01-31T13:15:10.630

Modified: 2024-11-21T08:49:45.880

Link: CVE-2024-1085

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-01-31T00:00:00Z

Links: CVE-2024-1085 - Bugzilla

cve-icon OpenCVE Enrichment

No data.