Skip to main content

CVE-2024-27064: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-27064cvecve-2024-27064
Published: Wed May 01 2024 (05/01/2024, 13:04:05 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix a memory leak in nf_tables_updchain If nft_netdev_register_hooks() fails, the memory associated with nft_stats is not freed, causing a memory leak. This patch fixes it by moving nft_stats_alloc() down after nft_netdev_register_hooks() succeeds.

AI-Powered Analysis

AILast updated: 06/28/2025, 02:56:42 UTC

Technical Analysis

CVE-2024-27064 is a vulnerability identified in the Linux kernel's netfilter subsystem, specifically within the nf_tables component. The issue arises in the function nft_netdev_register_hooks(), which is responsible for registering network device hooks for nftables, a framework used for packet filtering and classification. When nft_netdev_register_hooks() fails, the memory allocated for nft_stats is not properly freed, resulting in a memory leak. This leak occurs because nft_stats_alloc() is called before the success of nft_netdev_register_hooks() is confirmed, leading to allocated memory persisting even when the hook registration fails. The vulnerability has been addressed by adjusting the code to allocate nft_stats only after nft_netdev_register_hooks() succeeds, thereby preventing the memory leak. Although this vulnerability does not directly allow for code execution or privilege escalation, it can cause resource exhaustion over time if exploited, potentially degrading system performance or causing denial of service (DoS) conditions. The affected versions include several specific Linux kernel commits, indicating that the issue is present in certain recent kernel builds prior to the patch. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-27064 primarily revolves around system stability and availability. Linux is widely used across European enterprises, government agencies, and critical infrastructure, often powering servers, network devices, and embedded systems. A memory leak in the netfilter nf_tables subsystem could lead to gradual resource depletion, causing degraded network filtering performance or eventual system crashes if the leak is significant and persistent. This can disrupt services reliant on Linux-based firewalls or routers, impacting business continuity and potentially exposing networks to further risks if packet filtering fails. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact can be significant in high-demand environments. Organizations with large-scale Linux deployments or those using nftables extensively for network security are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation, especially in targeted attacks against critical infrastructure or service providers.

Mitigation Recommendations

To mitigate CVE-2024-27064, European organizations should promptly apply the official Linux kernel patches that address the memory leak by ensuring nft_stats allocation occurs only after successful hook registration. System administrators should: 1) Identify all Linux systems running affected kernel versions, particularly those using nftables for network filtering. 2) Schedule and deploy kernel updates from trusted sources, prioritizing critical infrastructure and network devices. 3) Monitor system memory usage and network subsystem logs for unusual patterns that may indicate resource leaks. 4) Implement proactive resource management and automated alerts to detect potential memory exhaustion early. 5) For environments where immediate patching is not feasible, consider temporary workarounds such as limiting nftables usage or restarting affected services periodically to reclaim leaked memory. 6) Maintain robust backup and recovery procedures to minimize downtime in case of service disruption. These steps go beyond generic advice by focusing on targeted detection and operational controls specific to the nf_tables subsystem and Linux kernel memory management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.215Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbddbc8

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 2:56:42 AM

Last updated: 8/12/2025, 12:51:13 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats