Lucene search

K
nvd[email protected]NVD:CVE-2023-3390
HistoryJun 28, 2023 - 9:15 p.m.

CVE-2023-3390

2023-06-2821:15:10
CWE-416
web.nvd.nist.gov
1
linux kernel
netfilter subsystem
use-after-free
privilege escalation
cve-2023-3390
vulnerability
error handling
commit1240eb93f0616b21c675416516ff3d74798fdc97

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A use-after-free vulnerability was found in the Linux kernel’s netfilter subsystem in net/netfilter/nf_tables_api.c.

Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.

We recommend upgrading past commitΒ 1240eb93f0616b21c675416516ff3d74798fdc97.

Affected configurations

NVD
Node
linuxlinux_kernelRange3.16–4.14.322
OR
linuxlinux_kernelRange4.15–4.19.291
OR
linuxlinux_kernelRange4.20–5.4.251
OR
linuxlinux_kernelRange5.5–5.10.188
OR
linuxlinux_kernelRange5.11–5.15.118
OR
linuxlinux_kernelRange5.16–6.1.35
OR
linuxlinux_kernelRange6.2–6.3.9
Node
netapph300sMatch-
OR
netapph410cMatch-
OR
netapph410sMatch-
OR
netapph500sMatch-
OR
netapph700sMatch-

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%