A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.
We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2024-01-31 13:15
Updated : 2024-06-27 12:15
NVD link : CVE-2024-1086
Mitre link : CVE-2024-1086
CVE.ORG link : CVE-2024-1086
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_for_power_little_endian
- enterprise_linux_workstation
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_for_power_big_endian
fedoraproject
- fedora
linux
- linux_kernel
CWE
CWE-416
Use After Free