CVE-2024-1086

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
References
Link Resource
http://www.openwall.com/lists/oss-security/2024/04/10/22 Mailing List Patch
http://www.openwall.com/lists/oss-security/2024/04/10/23 Mailing List Patch
http://www.openwall.com/lists/oss-security/2024/04/14/1 Exploit Mailing List
http://www.openwall.com/lists/oss-security/2024/04/15/2 Mailing List
http://www.openwall.com/lists/oss-security/2024/04/17/5 Exploit Mailing List
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 Patch
https://github.com/Notselwyn/CVE-2024-1086 Exploit Third Party Advisory
https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/ Mailing List
https://news.ycombinator.com/item?id=39828424 Issue Tracking
https://pwning.tech/nftables/ Exploit Technical Description Third Party Advisory
https://security.netapp.com/advisory/ntap-20240614-0009/ Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/04/10/22 Mailing List Patch
http://www.openwall.com/lists/oss-security/2024/04/10/23 Mailing List Patch
http://www.openwall.com/lists/oss-security/2024/04/14/1 Exploit Mailing List
http://www.openwall.com/lists/oss-security/2024/04/15/2 Mailing List
http://www.openwall.com/lists/oss-security/2024/04/17/5 Exploit Mailing List
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 Patch
https://github.com/Notselwyn/CVE-2024-1086 Exploit Third Party Advisory
https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/ Mailing List
https://news.ycombinator.com/item?id=39828424 Issue Tracking
https://pwning.tech/nftables/ Exploit Technical Description Third Party Advisory
https://security.netapp.com/advisory/ntap-20240614-0009/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*

History

13 Feb 2025, 18:16

Type Values Removed Values Added
Summary (en) A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660. (en) A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.

27 Jan 2025, 20:55

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List

21 Nov 2024, 08:49

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/04/10/22 - Mailing List, Patch () http://www.openwall.com/lists/oss-security/2024/04/10/22 - Mailing List, Patch
References () http://www.openwall.com/lists/oss-security/2024/04/10/23 - Mailing List, Patch () http://www.openwall.com/lists/oss-security/2024/04/10/23 - Mailing List, Patch
References () http://www.openwall.com/lists/oss-security/2024/04/14/1 - Exploit, Mailing List () http://www.openwall.com/lists/oss-security/2024/04/14/1 - Exploit, Mailing List
References () http://www.openwall.com/lists/oss-security/2024/04/15/2 - Mailing List () http://www.openwall.com/lists/oss-security/2024/04/15/2 - Mailing List
References () http://www.openwall.com/lists/oss-security/2024/04/17/5 - Exploit, Mailing List () http://www.openwall.com/lists/oss-security/2024/04/17/5 - Exploit, Mailing List
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 - Patch () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 - Patch
References () https://github.com/Notselwyn/CVE-2024-1086 - Exploit, Third Party Advisory () https://github.com/Notselwyn/CVE-2024-1086 - Exploit, Third Party Advisory
References () https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660 - Patch () https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/ - Mailing List () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/ - Mailing List
References () https://news.ycombinator.com/item?id=39828424 - Issue Tracking () https://news.ycombinator.com/item?id=39828424 - Issue Tracking
References () https://pwning.tech/nftables/ - Exploit, Technical Description, Third Party Advisory () https://pwning.tech/nftables/ - Exploit, Technical Description, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240614-0009/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20240614-0009/ - Third Party Advisory

14 Aug 2024, 19:41

Type Values Removed Values Added
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 - Mailing List, Patch () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240614-0009/ - () https://security.netapp.com/advisory/ntap-20240614-0009/ - Third Party Advisory
CPE cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*
First Time Netapp a250 Firmware
Netapp a250
Debian debian Linux
Netapp 500f
Netapp
Netapp c250 Firmware
Debian
Netapp 500f Firmware
Netapp c250

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 21:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html -

14 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240614-0009/ -

07 Jun 2024, 13:25

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/04/10/22 - () http://www.openwall.com/lists/oss-security/2024/04/10/22 - Mailing List, Patch
References () http://www.openwall.com/lists/oss-security/2024/04/10/23 - () http://www.openwall.com/lists/oss-security/2024/04/10/23 - Mailing List, Patch
References () http://www.openwall.com/lists/oss-security/2024/04/14/1 - () http://www.openwall.com/lists/oss-security/2024/04/14/1 - Exploit, Mailing List
References () http://www.openwall.com/lists/oss-security/2024/04/15/2 - () http://www.openwall.com/lists/oss-security/2024/04/15/2 - Mailing List
References () http://www.openwall.com/lists/oss-security/2024/04/17/5 - () http://www.openwall.com/lists/oss-security/2024/04/17/5 - Exploit, Mailing List
References () https://github.com/Notselwyn/CVE-2024-1086 - () https://github.com/Notselwyn/CVE-2024-1086 - Exploit, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/ - Mailing List
References () https://news.ycombinator.com/item?id=39828424 - () https://news.ycombinator.com/item?id=39828424 - Issue Tracking
References () https://pwning.tech/nftables/ - () https://pwning.tech/nftables/ - Exploit, Technical Description, Third Party Advisory
CPE cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*
First Time Fedoraproject fedora
Redhat enterprise Linux Workstation
Redhat enterprise Linux Desktop
Redhat enterprise Linux For Power Little Endian
Fedoraproject
Redhat enterprise Linux Server
Redhat
Redhat enterprise Linux For Power Big Endian
Redhat enterprise Linux For Ibm Z Systems

01 May 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/10/22 -
  • () http://www.openwall.com/lists/oss-security/2024/04/10/23 -
  • () http://www.openwall.com/lists/oss-security/2024/04/14/1 -
  • () http://www.openwall.com/lists/oss-security/2024/04/15/2 -
  • () http://www.openwall.com/lists/oss-security/2024/04/17/5 -

26 Mar 2024, 18:15

Type Values Removed Values Added
References
  • () https://pwning.tech/nftables/ -

26 Mar 2024, 17:15

Type Values Removed Values Added
References
  • () https://news.ycombinator.com/item?id=39828424 -
  • () https://github.com/Notselwyn/CVE-2024-1086 -

06 Feb 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/ -

05 Feb 2024, 20:41

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
References () https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660 - () https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660 - Patch
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 - () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 - Mailing List, Patch

31 Jan 2024, 14:05

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-31 13:15

Updated : 2025-04-02 20:32


NVD link : CVE-2024-1086

Mitre link : CVE-2024-1086

CVE.ORG link : CVE-2024-1086


JSON object : View

Products Affected

redhat

  • enterprise_linux_for_ibm_z_systems
  • enterprise_linux_for_power_little_endian
  • enterprise_linux_workstation
  • enterprise_linux_server
  • enterprise_linux_for_power_big_endian
  • enterprise_linux_desktop

debian

  • debian_linux

netapp

  • 500f
  • c250_firmware
  • a250
  • a250_firmware
  • c250
  • 500f_firmware

fedoraproject

  • fedora

linux

  • linux_kernel
CWE
CWE-416

Use After Free