CVE-2024-1086

Scores

EPSS

0.854high85.4%
0%20%40%60%80%100%

Percentile: 85.4%

CVSS

7.8high3.x
0246810

CVSS Score: 7.8/10

All CVSS Scores

CVSS 3.x
7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Description

A use-after-free vulnerability in the Linux kernel’s netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.

We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

astradebiannvdredhatubuntu

CWEs

416CWE-416

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-1086

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Vulnerable Software (281)

Type: Configuration

Product: kernel

Operating System: rhel 7

Trait:
{  "fixed": "3.10.0-1160.114.2.el7"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 7.6

Trait:
{  "fixed": "3.10.0-957.113.1.el7"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 7.7

Trait:
{  "fixed": "3.10.0-1062.88.1.el7"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 8

Trait:
{  "fixed": "4.18.0-513.24.1.el8_9"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 8.2

Trait:
{  "fixed": "4.18.0-193.135.1.el8_2"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 8.4

Trait:
{  "fixed": "4.18.0-305.131.1.el8_4"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 8.4

Trait:
{  "fixed": "4.18.0-305.131.1.el8_4"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 8.4

Trait:
{  "fixed": "4.18.0-305.131.1.el8_4"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 8.6

Trait:
{  "fixed": "4.18.0-372.93.1.el8_6"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 8.8

Trait:
{  "fixed": "4.18.0-477.51.1.el8_8"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel

Trait:
{  "fixed": "5.14.0-427.13.1.el9_4"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 9

Trait:
{  "fixed": "5.14.0-427.13.1.el9_4"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel

Trait:
{  "fixed": "5.14.0-70.101.1.el9_0"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel

Trait:
{  "fixed": "5.14.0-284.55.1.el9_2"}

Source: redhat

Type: Configuration

Product: kernel

Operating System: rhel 4.4

Trait:
{  "fixed": "4.18.0-372.93.1.el8_6"}

Source: redhat

Type: Configuration

Product: kernel-rt

Operating System: rhel

Trait:
{  "fixed": "3.10.0-1160.114.2.rt56.1266.el7"}

Source: redhat

Type: Configuration

Product: kernel-rt

Operating System: rhel

Trait:
{  "fixed": "4.18.0-513.24.1.rt7.326.el8_9"}

Source: redhat

Type: Configuration

Product: kernel-rt

Operating System: rhel

Trait:
{  "fixed": "4.18.0-305.131.1.rt7.207.el8_4"}

Source: redhat

Type: Configuration

Product: kernel-rt

Operating System: rhel

Trait:
{  "fixed": "5.14.0-70.101.1.rt21.173.el9_0"}

Source: redhat

Type: Configuration

Product: kernel-rt

Operating System: rhel

Trait:
{  "fixed": "5.14.0-284.55.1.rt14.340.el9_2"}

Source: redhat