CVE-2024-1085

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's netfilter nf_tables component that allows local privilege escalation. An attacker with local access can exploit a double-free condition to gain root privileges. This affects Linux systems with nf_tables enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions before commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires nf_tables subsystem to be enabled and accessible. Most modern Linux distributions have this enabled by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root privileges, compromising the entire system and potentially pivoting to other systems.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls and execute arbitrary code as root.

🟢

If Mitigated

Limited impact if proper access controls restrict local user access and kernel hardening measures are in place.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Internal users with shell access can exploit this to gain root privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of kernel exploitation techniques. The vulnerability is in a complex kernel subsystem.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7

Vendor Advisory: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable nf_tables module

linux

Temporarily disable the vulnerable nf_tables subsystem if not required

modprobe -r nf_tables
echo 'blacklist nf_tables' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Restrict local user access to minimize attack surface
  • Implement kernel hardening measures like SELinux/AppArmor to limit impact

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7 is present: git log --oneline | grep b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update and ensure commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7 is present in kernel logs

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • System crashes related to netfilter/nf_tables
  • Unexpected privilege escalation events

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Search for kernel panic events or privilege escalation alerts from local users

🔗 References

📤 Share & Export