CISA KEV 정보
| 취약점명 | Linux Kernel Use-After-Free Vulnerability |
|---|---|
| 설명 | Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation. |
| 조치사항 | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-416 |
| 등록일 (KEV) | 2024-05-30 |
| 조치 기한 | 2024-06-20 |
| 추가 참고 | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660; https://nvd.nist.gov/vuln/detail/CVE-2024-1086 |
NVD 상세 정보
CVSS v3.1: 7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H설명: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
CWE: CWE-416 | CWE-416
참조
- http://www.openwall.com/lists/oss-security/2024/04/10/22 [Mailing List, Patch]
- http://www.openwall.com/lists/oss-security/2024/04/10/23 [Mailing List, Patch]
- http://www.openwall.com/lists/oss-security/2024/04/14/1 [Exploit, Mailing List]
- http://www.openwall.com/lists/oss-security/2024/04/15/2 [Mailing List]
- http://www.openwall.com/lists/oss-security/2024/04/17/5 [Exploit, Mailing List]
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 [Patch]
- https://github.com/Notselwyn/CVE-2024-1086 [Exploit, Third Party Advisory]
- https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660 [Patch]
- https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html [Mailing List]
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html [Mailing List]
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/ [Mailing List]
- https://news.ycombinator.com/item?id=39828424 [Issue Tracking]
- https://pwning.tech/nftables/ [Exploit, Technical Description, Third Party Advisory]
- https://security.netapp.com/advisory/ntap-20240614-0009/ [Third Party Advisory]
- http://www.openwall.com/lists/oss-security/2024/04/10/22 [Mailing List, Patch]
- ... 외 14건
This product uses the NVD API but is not endorsed or certified by the NVD.