7.8
CVSSv3

CVE-2024-1086

Published: 31/01/2024 Updated: 01/05/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660. (CVE-2024-1086) In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel up to and including 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access. (CVE-2024-23849)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

linux linux kernel 6.8

Vendor Advisories

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error ...
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error ...
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error ...
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error ...
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error ...
LTC-120 is being updated in the LTC (Long Term Support Candidate) channel, version 12006099302 (Platform Version: 15662980), for most ChromeOS devices Release notes for LTC-120 can be found here Want to know more about Long-term Support? Click hereThis update contains selective Security fixes, including:Chrome Browser Security ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2024-1086: Linux: nf_tables: use-after-free vulnerability in the nft_verdict_init() function <!--X-Subject-Header-End--> < ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: CVE-2024-1086: Linux: nf_tables: use-after-free vulnerability in the nft_verdict_init() function <!--X-Subject-Header-End- ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Linux: Disabling network namespaces <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Solar Designer &lt;solar () o ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: Linux: Disabling network namespaces <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Demi Marie Obenour &lt;de ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: Linux: Disabling network namespaces <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Georgia Garcia &lt;georgi ...

Github Repositories

Error in user YAML: (&lt;unknown&gt;): did not find expected comment or line break while scanning a block scalar at line 2 column 1--- # GitHub All Languages Daily Trending | Title | Summary | | --- | --- | | [semanser/codel](githubcom/semanser/codel) | 这是一个关于全自主AI代理的GitHub README文件。它详细介绍了如何运行这个项目,包

notselwyn@archbtwlocal:~$ neofetch ~vVeZNgQBBBQQg9Ze1v~ `^}%B@@@@@@@@@@@@@@@@@@@@@@8%}=` notselwyn@archbtwlocal -Lq#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#qr- ----------------------- V0@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0? OS: GNU/Linux _l#@@@@@@@@@@@@@@@@@@@@@@

Proof-of-concept exploit for CVE-2024-1086, working on most Linux kernels between (including) v5.14 and (including) v6.6, including (but not limited to) Debian, Ubuntu, and KernelCTF.

CVE-2024-1086 Proof-of-concept exploit for CVE-2024-1086, working on most Linux kernels between (including) v514 and (including) v66, including (but not limited to) Debian, Ubuntu, and KernelCTF coming soon stay tuned! blogpost dropping soon

A curated list of my GitHub stars!

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents Assembly C C# C++ CMake CSS Cuda Dockerfile Go HCL HTML Java JavaScript Jupyter Notebook LLVM Lua Makefile NASL OCaml Others PHP Perl Python RobotFramework Ruby Rust Scala Shell Swift Tcl TeX TypeScript VHDL Verilog Assembly SpinalHDL/VexRiscv - A FPGA friendly 32 bit RISC-V CPU implementation

notselwyn@archbtwlocal:~$ neofetch ~vVeZNgQBBBQQg9Ze1v~ `^}%B@@@@@@@@@@@@@@@@@@@@@@8%}=` notselwyn@archbtwlocal -Lq#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#qr- ----------------------- V0@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0? OS: GNU/Linux _l#@@@@@@@@@@@@@@@@@@@@@@

CVE-2024-1086 Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v514 and v66, including Debian, Ubuntu, and KernelCTF The success rate is 994% in KernelCTF images exploit_pocmp4 Blogpost / Write-up A full write-up of the exploit - including background information and

Recent Articles

Easy-to-use make-me-root exploit lands for recent Linux kernels. Get patching
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources CVE-2024-1086 turns the page tables on system admins

A Linux privilege-escalation proof-of-concept exploit has been published that, according to the bug hunter who developed it, typically works effortlessly on kernel versions between at least 5.14 and 6.6.14.  Running the exploit as a normal user on a vulnerable machine will grant you root access to the box, allowing you to do whatever you want on it. This can be used by rogue insiders or malware already on a computer to cause further damage and problems. This affects Debian, Ubuntu, Red Hat,...