Resolved Vulnerability in netfilter: nft_set_pipapo
CVE-2024-26809

5.5MEDIUM

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
4 April 2024

Badges

📈 Score: 511👾 Exploit Exists📰 News Worthy

What is CVE-2024-26809?

CVE-2024-26809 is a vulnerability within the Linux kernel's netfilter subsystem, specifically affecting the nft_set_pipapo feature. Netfilter is integral to managing network traffic in Linux, enabling advanced packet filtering and manipulation. The vulnerability arises from improper handling of memory when elements are released, which could lead to memory corruption. If exploited, this could negatively impact organizations by disrupting network services, allowing unauthorized access, or causing system instability.

Technical Details

The vulnerability is related to the way elements in the pipapo clone are managed during the destruction process. Specifically, the issue exists where elements were being released inappropriately, leading to scenarios where they could be destroyed multiple times. The fix implemented ensures that the current view of the lookup table is utilized during destruction, preventing this overlapping memory issue. This fix was introduced in the context of improvements to the netfilter commit protocol and relates to previous corrections to enhance stability and memory safety.

Potential Impact of CVE-2024-26809

  1. Memory Corruption: If exploited, this vulnerability could lead to memory leaks or corruption, potentially crashing the affected systems or causing erratic behavior that affects network performance.

  2. Service Disruption: Disrupting the normal functioning of network traffic filtering can lead to significant service interruptions, affecting applications and services dependent on reliable network communications.

  3. Increased Attack Surface: By providing an avenue for potential exploitation, this vulnerability increases the risk of unauthorized access to systems, potentially enabling attackers to execute additional malicious activities.

Affected Version(s)

Linux 4a6430b99f67842617c7208ca55a411e903ba03a

Linux 5ccecafc728b0df48263d5ac198220bcd79830bc < 362508506bf545e9ce18c72a2c48dcbfb891ab9c

Linux 9827a0e6e23bf43003cd3d5b7fb11baf59a35e1e < 5ad233dc731ab64cdc47b84a5c1f78fff6c024af

News Articles

CVE-2024-26809: Linux Nftables Double-Free Vulnerability

CVE-2024-26809 is a critical Linux nftables flaw allowing privilege escalation via a double-free bug. Patch your systems to prevent potential exploitation.

PoC Exploit Released For Linux Kernel’s nftables Subsystem Vulnerability

A critical Proof-of-Concept (PoC) exploit has been released for a significant vulnerability in the Linux kernel’s nftables subsystem.

PoC Code Published for Linux nftables Security Vulnerability

Security researchers have published proof-of-concept (PoC) exploit code for CVE-2024-26809, a high-severity double-free vulnerability in Linux’s nftables firewall subsystem.

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by GBHackers News

  • Vulnerability published

.
CVE-2024-26809 : Resolved Vulnerability in netfilter: nft_set_pipapo