CVE-2024-1086 - Use After Free

Severity

78%

Complexity

18%

Confidentiality

98%

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.

CVSS 3.1 Base Score 7.8. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Demo Examples

Use After Free

CWE-416

The following example demonstrates the weakness.


               
}
free(buf3R2);

Use After Free

CWE-416

The following code illustrates a use after free error:


               
}
free(ptr);
logError("operation aborted before commit", ptr);

When an error occurs, the pointer is immediately freed. However, this pointer is later incorrectly used in the logError function.

Overview

Type

Linux

First reported 1 year ago

2024-01-31 13:15:00

Last updated 6 months ago

2024-11-21 08:49:00

Affected Software

Linux Kernel

RedHat Enterprise Linux Desktop 7.0

7.0

RedHat Enterprise Linux Workstation 7.0

7.0

RedHat Enterprise Linux Server 7.0

7.0

References

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660

https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660

Mailing List, Patch

https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660

Patch

https://lists.fedoraproject.org/archives/list/[email protected]/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/

https://github.com/Notselwyn/CVE-2024-1086

https://news.ycombinator.com/item?id=39828424

https://pwning.tech/nftables/

http://www.openwall.com/lists/oss-security/2024/04/15/2

http://www.openwall.com/lists/oss-security/2024/04/10/23

http://www.openwall.com/lists/oss-security/2024/04/10/22

http://www.openwall.com/lists/oss-security/2024/04/14/1

http://www.openwall.com/lists/oss-security/2024/04/17/5

https://lists.fedoraproject.org/archives/list/[email protected]/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/

Mailing List

https://github.com/Notselwyn/CVE-2024-1086

Exploit, Third Party Advisory

https://news.ycombinator.com/item?id=39828424

Issue Tracking

https://pwning.tech/nftables/

Exploit, Technical Description, Third Party Advisory

http://www.openwall.com/lists/oss-security/2024/04/15/2

Mailing List

http://www.openwall.com/lists/oss-security/2024/04/10/23

Mailing List, Patch

http://www.openwall.com/lists/oss-security/2024/04/10/22

Mailing List, Patch

http://www.openwall.com/lists/oss-security/2024/04/14/1

Exploit, Mailing List

http://www.openwall.com/lists/oss-security/2024/04/17/5

Exploit, Mailing List

https://security.netapp.com/advisory/ntap-20240614-0009/

https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html

https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660

Patch

https://security.netapp.com/advisory/ntap-20240614-0009/

Third Party Advisory

https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html

Mailing List, Third Party Advisory

https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Mailing List, Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.