CVE-2024-26581 PoC Exploit Released: Linux Systems at Risk of Root Compromise
Security researchers have disclosed technical details and a proof-of-concept (PoC) exploit for a high-severity vulnerability in the Linux kernel, identified as CVE-2024-26581 with a CVSS score of 7.8. This vulnerability allows local authenticated attackers to obtain sensitive information from affected systems and potentially escalate their privileges to root level. The flaw is found in the nft_set_rbtree function of the nftables framework, which manages sets and can be exploited by sending a specially crafted request that leads to the unauthorized disclosure of an "end interval element" during a transaction. The issue is due to a missing check in the nft_rbtree_gc\_elem function that can result in a use-after-free condition during the rollback of a transaction when an error is detected. Linux kernel versions 6.1.9, 5.15.91, and 5.10.166 and later are vulnerable. System administrators should update their kernel versions and monitor for suspicious activity related to nftables, as well as implement additional security measures like SELinux to mitigate the risk. CVEs: CVE-2024-26581 [View Article](https://securityonline.info/cve-2024-26581-poc-exploit-released-linux-systems-at-risk-of-root-compromise/)