Lucene search

K
nvd[email protected]NVD:CVE-2023-32233
HistoryMay 08, 2023 - 8:15 p.m.

CVE-2023-32233

2023-05-0820:15:20
CWE-416
web.nvd.nist.gov
1
netfilter nf_tables
arbitrary read
arbitrary write
kernel memory
unprivileged user
root privileges
anonymous sets
security vulnerability

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.

Affected configurations

NVD
Node
linuxlinux_kernelRange3.134.14.315
OR
linuxlinux_kernelRange4.154.19.283
OR
linuxlinux_kernelRange4.205.4.243
OR
linuxlinux_kernelRange5.55.10.180
OR
linuxlinux_kernelRange5.115.15.111
OR
linuxlinux_kernelRange5.166.1.28
OR
linuxlinux_kernelRange6.26.2.15
OR
linuxlinux_kernelRange6.36.3.2
Node
redhatenterprise_linuxMatch7.0
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
Node
netapphci_baseboard_management_controllerMatchh300s
OR
netapphci_baseboard_management_controllerMatchh410c
OR
netapphci_baseboard_management_controllerMatchh410s
OR
netapphci_baseboard_management_controllerMatchh500s
OR
netapphci_baseboard_management_controllerMatchh700s

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%