Linux nftables vulnerability exploited in the wild (CrowdStrike)
According to CrowdStrike, a vulnerability in the Linux kernel's nftables code that was discovered earlier this year is being actively exploited in the wild. The vulnerability allows for local privilege escalation. Most distributions have already released a fix.
As noted by the exploit developer, leveraging this POC is dependent on the kernel's unprivileged user namespaces feature accessing nf_tables. This access is enabled by default on Debian, Ubuntu and kernel capture-the-flag (CTF) distributions. An attacker can then trigger the double-free vulnerability, scan the physical memory for the kernel base address, bypass kernel address-space layout randomization (KASLR) and access the modprobe_path kernel variable with read/write privileges. After overwriting the modprobe_path, the exploit drops a root shell.
Posted Jun 9, 2024 19:38 UTC (Sun)
by cyperpunks (subscriber, #39406)
[Link] (3 responses)
The only sane way forward is to use better tools which detect such bugs at build time.
Posted Jun 10, 2024 10:09 UTC (Mon)
by WolfWings (subscriber, #56790)
[Link]
Posted Jun 11, 2024 7:10 UTC (Tue)
by error27 (subscriber, #8346)
[Link] (1 responses)
Posted Jun 22, 2024 23:58 UTC (Sat)
by mrugiero (guest, #153040)
[Link]
Posted Jun 10, 2024 11:36 UTC (Mon)
by rweikusat2 (subscriber, #117920)
[Link]
It's hard to argue against memory safe programming languages (like Rust)
It's hard to argue against memory safe programming languages (like Rust)
It's hard to argue against memory safe programming languages (like Rust)
It's hard to argue against memory safe programming languages (like Rust)
Looks like an ad.