Bug 2262127 (CVE-2024-1085) - CVE-2024-1085 kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function
Summary: CVE-2024-1085 kernel: nf_tables: use-after-free vulnerability in the nft_sete...
Keywords:
Status: NEW
Alias: CVE-2024-1085
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2262129
Blocks: 2262125
TreeView+ depends on / blocked
 
Reported: 2024-01-31 18:06 UTC by Patrick Del Bello
Modified: 2024-05-02 22:50 UTC (History)
51 users (show)

Fixed In Version: kernel 6.8-rc1
Doc Type: If docs needed, set a value
Doc Text:
A double-free flaw was found in how the Linux kernel's NetFilter system marks whether a catch-all element is enabled. A local user could use this flaw to crash the system.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:2634 0 None None None 2024-05-01 01:22:28 UTC
Red Hat Product Errata RHBA-2024:2650 0 None None None 2024-05-02 00:15:15 UTC
Red Hat Product Errata RHBA-2024:2686 0 None None None 2024-05-02 22:50:22 UTC
Red Hat Product Errata RHSA-2024:1018 0 None None None 2024-02-28 12:41:34 UTC
Red Hat Product Errata RHSA-2024:1019 0 None None None 2024-02-28 12:34:11 UTC
Red Hat Product Errata RHSA-2024:2394 0 None None None 2024-04-30 10:15:33 UTC

Description Patrick Del Bello 2024-01-31 18:06:15 UTC
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.

We recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7
https://kernel.dance/b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7

Comment 1 Patrick Del Bello 2024-01-31 18:06:50 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2262129]

Comment 9 Justin M. Forbes 2024-02-02 22:57:44 UTC
This was fixed for Fedora with the 6.6.14 stable kernel updates.

Comment 13 errata-xmlrpc 2024-02-28 12:34:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:1019 https://access.redhat.com/errata/RHSA-2024:1019

Comment 14 errata-xmlrpc 2024-02-28 12:41:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:1018 https://access.redhat.com/errata/RHSA-2024:1018

Comment 18 errata-xmlrpc 2024-04-30 10:15:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2394


Note You need to log in before you can comment on or make changes to this bug.