CVE-2024-41040
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-41040 is a use-after-free (UAF) vulnerability discovered in the Linux kernel's network scheduler component. The vulnerability occurs when a connection tracking (ct) object may be dropped if a clash has been resolved but is still passed to the tcfctflowtableprocess_conn function for further usage (Kernel Patch).

Technical details

The vulnerability manifests as a use-after-free condition in the tcfctflowtableprocessconn function within the actct module. KASAN (Kernel Address Sanitizer) reported the issue as a slab-use-after-free error, with a read of size 1 occurring at a freed memory address. The bug occurs when a connection tracking object is freed during clash resolution but the code continues to use the freed pointer. The vulnerability affects Linux kernel versions from 5.10.43 up to versions before 5.10.222, 5.12.10 to 5.13, 5.13 to 5.15.163, 5.16 to 6.1.100, and other ranges. The CVSS v3.1 base score is 7.0 (High) with vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability could lead to use-after-free conditions in the kernel's network scheduler component, potentially resulting in system crashes, memory corruption, or privilege escalation. The high CVSS score indicates that successful exploitation could have severe consequences for system security, though local access and high complexity are required (NVD).

Mitigation and workarounds

The vulnerability has been patched in the Linux kernel. The fix involves retrieving the connection tracking object from the socket buffer (skb) again after confirming conntrack to prevent the use-after-free condition. The patch has been backported to multiple kernel versions. System administrators should update their kernel to a patched version (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40205HIGH7.8
  • Linux KernelLinux Kernel
  • linux-hwe-6.14
NoYesNov 12, 2025
CVE-2025-40211HIGH7.1
  • Linux KernelLinux Kernel
  • linux-azure-fde-6.14
NoYesNov 21, 2025
CVE-2025-40206MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel
NoYesNov 12, 2025
CVE-2025-40210MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-tools-libs-devel
NoYesNov 21, 2025
CVE-2025-40212N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k
NoYesNov 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management