In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
05 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2023/05/08/4 - Mailing List, Patch, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=35879660 - Issue Tracking | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2196105 - Issue Tracking, Mitigation, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20230616-0002/ - Mailing List, Third Party Advisory | |
References | () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab - Mailing List, Patch | |
References | () https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html - Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5402 - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html - Patch, Third Party Advisory | |
References | () https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab - Patch | |
References | () http://www.openwall.com/lists/oss-security/2023/05/15/5 - Mailing List, Third Party Advisory | |
First Time |
Netapp hci Baseboard Management Controller
Netapp |
|
CPE | cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:* cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:* cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:* cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:* cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:* |
27 Jul 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Jun 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jun 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jun 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 May 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 May 2023, 18:27
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2196105 - Issue Tracking, Mitigation, Third Party Advisory | |
References | (MISC) https://news.ycombinator.com/item?id=35879660 - Issue Tracking | |
References | (DEBIAN) https://www.debian.org/security/2023/dsa-5402 - Third Party Advisory | |
References | (MISC) https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab - Mailing List, Patch | |
References | (MISC) https://www.openwall.com/lists/oss-security/2023/05/08/4 - Mailing List, Patch, Third Party Advisory | |
References | (MISC) https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab - Patch | |
First Time |
Linux linux Kernel
Redhat Linux Redhat enterprise Linux |
|
CWE | CWE-416 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
14 May 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 May 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 May 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-08 20:15
Updated : 2025-05-05 16:15
NVD link : CVE-2023-32233
Mitre link : CVE-2023-32233
JSON object : View
Products Affected
linux
- linux_kernel
netapp
- hci_baseboard_management_controller
redhat
- enterprise_linux
CWE
CWE-416
Use After Free