Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-1086 PoC — Use-after-free in Linux kernel's netfilter: nf_tables component

Source
Associated Vulnerability
Title:Use-after-free in Linux kernel's netfilter: nf_tables component (CVE-2024-1086)
Description:A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
Readme
# CVE-2024-1086-checker

This is a simple checker script to detect the kernel configuration which is
vulnerable to exploitation. A result of "kernel config not vulnerable" from
this script only means that the vulnerability is not exploitable with currently
known paths.

## How to Use

```shell
curl -s "https://raw.githubusercontent.com/kevcooper/CVE-2024-1086-checker/main/check_cve_2024_1086.py" | python3
```

```shell
git clone https://github.com/kevcooper/CVE-2024-1086-checker.git
cd CVE-2024-1086-checker
python3 check_cve_2024_1086.py
```
File Snapshot

[4.0K] /data/pocs/3d0d1c5b72f5f52b2e839b41e7e01a548a2f43bc ├── [3.9K] check_cve_2024_1086.py ├── [1.0K] LICENSE └── [ 547] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →