
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-41040 is a use-after-free (UAF) vulnerability discovered in the Linux kernel's network scheduler component. The vulnerability occurs when a connection tracking (ct) object may be dropped if a clash has been resolved but is still passed to the tcfctflowtableprocess_conn function for further usage (Kernel Patch).
The vulnerability manifests as a use-after-free condition in the tcfctflowtableprocessconn function within the actct module. KASAN (Kernel Address Sanitizer) reported the issue as a slab-use-after-free error, with a read of size 1 occurring at a freed memory address. The bug occurs when a connection tracking object is freed during clash resolution but the code continues to use the freed pointer. The vulnerability affects Linux kernel versions from 5.10.43 up to versions before 5.10.222, 5.12.10 to 5.13, 5.13 to 5.15.163, 5.16 to 6.1.100, and other ranges. The CVSS v3.1 base score is 7.0 (High) with vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability could lead to use-after-free conditions in the kernel's network scheduler component, potentially resulting in system crashes, memory corruption, or privilege escalation. The high CVSS score indicates that successful exploitation could have severe consequences for system security, though local access and high complexity are required (NVD).
The vulnerability has been patched in the Linux kernel. The fix involves retrieving the connection tracking object from the socket buffer (skb) again after confirming conntrack to prevent the use-after-free condition. The patch has been backported to multiple kernel versions. System administrators should update their kernel to a patched version (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."