The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.
We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-3840-1 | linux security update |
![]() |
DLA-3841-1 | linux-5.10 security update |
![]() |
USN-6688-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-6700-1 | Linux kernel vulnerabilities |
![]() |
USN-6700-2 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-6701-1 | Linux kernel vulnerabilities |
![]() |
USN-6701-2 | Linux kernel (GCP) vulnerabilities |
![]() |
USN-6701-3 | Linux kernel vulnerabilities |
![]() |
USN-6701-4 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6702-1 | Linux kernel vulnerabilities |
![]() |
USN-6702-2 | Linux kernel vulnerabilities |
![]() |
USN-6704-1 | Linux kernel vulnerabilities |
![]() |
USN-6704-2 | Linux kernel (Raspberry Pi) vulnerabilities |
![]() |
USN-6704-3 | Linux kernel (Oracle) vulnerabilities |
![]() |
USN-6704-4 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-6705-1 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-6707-1 | Linux kernel vulnerabilities |
![]() |
USN-6707-2 | Linux kernel (ARM laptop) vulnerabilities |
![]() |
USN-6707-3 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-6707-4 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6716-1 | Linux kernel (Azure) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 14 Feb 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:* | |
Metrics |
kev
|
Thu, 13 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660. | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660. |
Wed, 14 Aug 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Debian
Debian debian Linux Netapp Netapp 500f Netapp 500f Firmware Netapp a250 Netapp a250 Firmware Netapp c250 Netapp c250 Firmware |
|
CPEs | cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Debian
Debian debian Linux Netapp Netapp 500f Netapp 500f Firmware Netapp a250 Netapp a250 Firmware Netapp c250 Netapp c250 Firmware |
Wed, 14 Aug 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-07-30T01:37:08.023Z
Reserved: 2024-01-30T20:04:09.704Z
Link: CVE-2024-1086

Updated: 2024-08-01T18:26:30.467Z

Status : Analyzed
Published: 2024-01-31T13:15:10.827
Modified: 2025-04-02T20:32:33.120
Link: CVE-2024-1086


No data.