Skip to main content

CVE-2024-27011: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-27011cvecve-2024-27011
Published: Wed May 01 2024 (05/01/2024, 05:29:33 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix memleak in map from abort path The delete set command does not rely on the transaction object for element removal, therefore, a combination of delete element + delete set from the abort path could result in restoring twice the refcount of the mapping. Check for inactive element in the next generation for the delete element command in the abort path, skip restoring state if next generation bit has been already cleared. This is similar to the activate logic using the set walk iterator. [ 6170.286929] ------------[ cut here ]------------ [ 6170.286939] WARNING: CPU: 6 PID: 790302 at net/netfilter/nf_tables_api.c:2086 nf_tables_chain_destroy+0x1f7/0x220 [nf_tables] [ 6170.287071] Modules linked in: [...] [ 6170.287633] CPU: 6 PID: 790302 Comm: kworker/6:2 Not tainted 6.9.0-rc3+ #365 [ 6170.287768] RIP: 0010:nf_tables_chain_destroy+0x1f7/0x220 [nf_tables] [ 6170.287886] Code: df 48 8d 7d 58 e8 69 2e 3b df 48 8b 7d 58 e8 80 1b 37 df 48 8d 7d 68 e8 57 2e 3b df 48 8b 7d 68 e8 6e 1b 37 df 48 89 ef eb c4 <0f> 0b 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 0f [ 6170.287895] RSP: 0018:ffff888134b8fd08 EFLAGS: 00010202 [ 6170.287904] RAX: 0000000000000001 RBX: ffff888125bffb28 RCX: dffffc0000000000 [ 6170.287912] RDX: 0000000000000003 RSI: ffffffffa20298ab RDI: ffff88811ebe4750 [ 6170.287919] RBP: ffff88811ebe4700 R08: ffff88838e812650 R09: fffffbfff0623a55 [ 6170.287926] R10: ffffffff8311d2af R11: 0000000000000001 R12: ffff888125bffb10 [ 6170.287933] R13: ffff888125bffb10 R14: dead000000000122 R15: dead000000000100 [ 6170.287940] FS: 0000000000000000(0000) GS:ffff888390b00000(0000) knlGS:0000000000000000 [ 6170.287948] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 6170.287955] CR2: 00007fd31fc00710 CR3: 0000000133f60004 CR4: 00000000001706f0 [ 6170.287962] Call Trace: [ 6170.287967] <TASK> [ 6170.287973] ? __warn+0x9f/0x1a0 [ 6170.287986] ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables] [ 6170.288092] ? report_bug+0x1b1/0x1e0 [ 6170.287986] ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables] [ 6170.288092] ? report_bug+0x1b1/0x1e0 [ 6170.288104] ? handle_bug+0x3c/0x70 [ 6170.288112] ? exc_invalid_op+0x17/0x40 [ 6170.288120] ? asm_exc_invalid_op+0x1a/0x20 [ 6170.288132] ? nf_tables_chain_destroy+0x2b/0x220 [nf_tables] [ 6170.288243] ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables] [ 6170.288366] ? nf_tables_chain_destroy+0x2b/0x220 [nf_tables] [ 6170.288483] nf_tables_trans_destroy_work+0x588/0x590 [nf_tables]

AI-Powered Analysis

AILast updated: 06/29/2025, 14:25:10 UTC

Technical Analysis

CVE-2024-27011 is a vulnerability identified in the Linux kernel's netfilter subsystem, specifically within the nf_tables component responsible for packet filtering and firewall functionality. The issue arises from improper handling of reference counts during the deletion of elements and sets in nf_tables transactions. The vulnerability is caused by the delete set command not relying on the transaction object for element removal, which can lead to a scenario where a combination of delete element and delete set commands executed from the abort path results in restoring the reference count of a mapping twice. This incorrect reference count restoration can cause a memory leak and potentially lead to use-after-free conditions or other memory corruption issues. The kernel logs indicate warnings and errors related to nf_tables_chain_destroy, highlighting the instability caused by this flaw. The fix involves checking for inactive elements in the next generation for the delete element command during the abort path and skipping state restoration if the next generation bit has already been cleared, aligning with the activation logic using the set walk iterator. This vulnerability affects Linux kernel versions including 6.9.0-rc3+ and possibly other versions with the nf_tables implementation prior to the patch. Although no known exploits are reported in the wild yet, the flaw could be leveraged by attackers with local access or through crafted network packets to cause denial of service or potentially escalate privileges by destabilizing kernel memory management.

Potential Impact

For European organizations, the impact of CVE-2024-27011 could be significant, especially for those relying on Linux-based infrastructure for critical network functions such as firewalls, routers, and servers. The vulnerability could lead to memory leaks and kernel instability, resulting in denial of service conditions that disrupt business operations. In environments where nf_tables is heavily used for network filtering and security policies, exploitation could degrade system reliability or be a stepping stone for privilege escalation attacks. This is particularly concerning for sectors like finance, telecommunications, government, and critical infrastructure, where Linux servers are prevalent and network security is paramount. Additionally, disruption of firewall functionality could expose internal networks to further attacks. Since the vulnerability requires interaction with nf_tables transactions, attackers might need local access or the ability to send specially crafted network traffic, which could be feasible in multi-tenant cloud environments or poorly segmented networks common in many European enterprises.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Since the vulnerability lies in the nf_tables subsystem, administrators should audit their use of nf_tables for firewall and packet filtering rules and consider temporarily disabling or limiting nf_tables usage if patching is delayed. Network segmentation and strict access controls can reduce the risk of exploitation by limiting attacker access to systems with vulnerable kernels. Monitoring kernel logs for warnings related to nf_tables_chain_destroy or unusual memory behavior can help detect attempts to exploit this flaw. Additionally, organizations should implement kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and enable security modules like SELinux or AppArmor to mitigate potential privilege escalation. For cloud environments, ensure that virtual machines and containers run updated kernels and restrict network traffic to minimize exposure. Finally, maintain a robust incident response plan to quickly address any signs of exploitation or system instability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.208Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe30cd

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 2:25:10 PM

Last updated: 7/28/2025, 9:59:47 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats