Логотип exploitDog
bind:"BDU:2024-04145" OR bind:"CVE-2024-26609"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-04145" OR bind:"CVE-2024-26609"

Количество 8

Количество 8

fstec логотип

BDU:2024-04145

больше 1 года назад

Уязвимость компоненты netfilter ядра операционной системы Linux в функции nft_verdict_init(), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.4
EPSS: Низкий
redhat логотип

CVE-2024-26609

больше 1 года назад

[REJECTED CVE] An issue was identified in the Linux kernel's netfilter subsystem related to nf_tables. The issue occurs when a positive value, such as NF_ACCEPT, is provided in the upper 16 bits of NF_DROP verdict parameters, which are expected to contain valid errno values (e.g., -EPERM). This improper input handling could lead to memory corruption, potentially allowing attackers to exploit the system.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-26609

больше 1 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-pmp7-xx3c-wr9q

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject QUEUE/DROP verdict parameters This reverts commit e0abdadcc6e1. core.c:nf_hook_slow assumes that the upper 16 bits of NF_DROP verdicts contain a valid errno, i.e. -EPERM, -EHOSTUNREACH or similar, or 0. Due to the reverted commit, its possible to provide a positive value, e.g. NF_ACCEPT (1), which results in use-after-free. Its not clear to me why this commit was made. NF_QUEUE is not used by nftables; "queue" rules in nftables will result in use of "nft_queue" expression. If we later need to allow specifiying errno values from userspace (do not know why), this has to call NF_DROP_GETERR and check that "err <= 0" holds true.

EPSS: Низкий
redos логотип

ROS-20240821-02

10 месяцев назад

Множественные уязвимости kernel-lt

CVSS3: 9.8
EPSS: Низкий
rocky логотип

RLSA-2024:3138

около 1 года назад

Moderate: kernel security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-3138

около 1 года назад

ELSA-2024-3138: kernel security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2394

около 1 года назад

ELSA-2024-2394: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-04145

Уязвимость компоненты netfilter ядра операционной системы Linux в функции nft_verdict_init(), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.4
больше 1 года назад
redhat логотип
CVE-2024-26609

[REJECTED CVE] An issue was identified in the Linux kernel's netfilter subsystem related to nf_tables. The issue occurs when a positive value, such as NF_ACCEPT, is provided in the upper 16 bits of NF_DROP verdict parameters, which are expected to contain valid errno values (e.g., -EPERM). This improper input handling could lead to memory corruption, potentially allowing attackers to exploit the system.

CVSS3: 5.5
больше 1 года назад
nvd логотип
CVE-2024-26609

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

больше 1 года назад
github логотип
GHSA-pmp7-xx3c-wr9q

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject QUEUE/DROP verdict parameters This reverts commit e0abdadcc6e1. core.c:nf_hook_slow assumes that the upper 16 bits of NF_DROP verdicts contain a valid errno, i.e. -EPERM, -EHOSTUNREACH or similar, or 0. Due to the reverted commit, its possible to provide a positive value, e.g. NF_ACCEPT (1), which results in use-after-free. Its not clear to me why this commit was made. NF_QUEUE is not used by nftables; "queue" rules in nftables will result in use of "nft_queue" expression. If we later need to allow specifiying errno values from userspace (do not know why), this has to call NF_DROP_GETERR and check that "err <= 0" holds true.

больше 1 года назад
redos логотип
ROS-20240821-02

Множественные уязвимости kernel-lt

CVSS3: 9.8
10 месяцев назад
rocky логотип
RLSA-2024:3138

Moderate: kernel security, bug fix, and enhancement update

около 1 года назад
oracle-oval логотип
ELSA-2024-3138

ELSA-2024-3138: kernel security, bug fix, and enhancement update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-2394

ELSA-2024-2394: kernel security, bug fix, and enhancement update (IMPORTANT)

около 1 года назад

Уязвимостей на страницу