mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
174 lines
5.9 KiB
JSON
174 lines
5.9 KiB
JSON
{
|
|
"id": "CVE-2024-1086",
|
|
"sourceIdentifier": "cve-coordination@google.com",
|
|
"published": "2024-01-31T13:15:10.827",
|
|
"lastModified": "2024-05-01T18:15:13.200",
|
|
"vulnStatus": "Undergoing Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.\n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad de use after free en el componente netfilter: nf_tables del kernel de Linux puede explotarse para lograr una escalada de privilegios local. La funci\u00f3n nft_verdict_init() permite valores positivos como error de eliminaci\u00f3n dentro del veredicto del gancho y, por lo tanto, la funci\u00f3n nf_hook_slow() puede causar una vulnerabilidad double free cuando NF_DROP se emite con un error de eliminaci\u00f3n similar a NF_ACCEPT. Recomendamos actualizar despu\u00e9s del compromiso f342de4e2f33e0e39165d8639387aa6c19dff660."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "cve-coordination@google.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-416"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "cve-coordination@google.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-416"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "3.15",
|
|
"versionEndExcluding": "6.1.76",
|
|
"matchCriteriaId": "D5B7FA3B-4605-4DF7-A8E1-B455017442C9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.2",
|
|
"versionEndExcluding": "6.6.15",
|
|
"matchCriteriaId": "87C718CB-AE3D-4B07-B4D9-BFF64183C468"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.7",
|
|
"versionEndExcluding": "6.7.3",
|
|
"matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/10/22",
|
|
"source": "cve-coordination@google.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/10/23",
|
|
"source": "cve-coordination@google.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/14/1",
|
|
"source": "cve-coordination@google.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/15/2",
|
|
"source": "cve-coordination@google.com"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/17/5",
|
|
"source": "cve-coordination@google.com"
|
|
},
|
|
{
|
|
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660",
|
|
"source": "cve-coordination@google.com",
|
|
"tags": [
|
|
"Mailing List",
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/Notselwyn/CVE-2024-1086",
|
|
"source": "cve-coordination@google.com"
|
|
},
|
|
{
|
|
"url": "https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660",
|
|
"source": "cve-coordination@google.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/",
|
|
"source": "cve-coordination@google.com"
|
|
},
|
|
{
|
|
"url": "https://news.ycombinator.com/item?id=39828424",
|
|
"source": "cve-coordination@google.com"
|
|
},
|
|
{
|
|
"url": "https://pwning.tech/nftables/",
|
|
"source": "cve-coordination@google.com"
|
|
}
|
|
]
|
|
} |