
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A use-after-free vulnerability was discovered in the Linux kernel's netfilter: nftables component (CVE-2024-1086). The vulnerability exists in the nftverdictinit() function, which allows positive values as drop error within the hook verdict, causing a double free vulnerability when NFDROP is issued with a drop error resembling NF_ACCEPT. The vulnerability affects Linux kernel versions from v3.15 up to v6.8-rc1, with patches released in February 2024 (Kernel Patch).
The vulnerability stems from improper input sanitization in the netfilter verdicts. The nftverdictinit() function fails to properly validate verdict parameters, allowing an attacker to trigger a double-free condition. The bug requires nf_tables to be enabled and unprivileged user namespaces to be accessible. The vulnerability has been assigned a CVSS v3.1 score of 7.8 (HIGH) with vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
Successful exploitation of this vulnerability can lead to local privilege escalation, allowing an unprivileged user to gain root privileges. The exploit can potentially break out of namespaces, including LXC containers and privileged Docker containers running on vulnerable Linux kernels. The exploit has demonstrated a 93%-99% success rate on various kernel versions (Exploit Analysis).
The primary mitigation is to update to kernel versions with the fix: v5.15.149 or later, v6.1.76 or later, or v6.6.15 or later. For systems that cannot be immediately updated, a temporary mitigation is to disable unprivileged user namespaces by setting kernel.unprivilegedusernsclone=0 or to disable network namespaces with user.maxnetnamespaces=0. Additionally, blacklisting the nf_tables kernel module can prevent exploitation if the module is not required (Openwall List).
The vulnerability has gained significant attention in the security community, with multiple Linux distributions rushing to release patches. The exploit's author published a detailed technical analysis that has been widely discussed in the security community. The vulnerability has been deemed serious enough to be included in CISA's Known Exploited Vulnerabilities Catalog, requiring federal agencies to patch by June 20, 2024 (Hacker News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”