CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%
A use-after-free vulnerability in the Linux kernel’s netfilter: nf_tables component can be exploited to achieve local privilege escalation.
The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.
We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
linux | linux_kernel | 6.7 | cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:* |
linux | linux_kernel | 6.7 | cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:* |
linux | linux_kernel | 6.7 | cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:* |
linux | linux_kernel | 6.7 | cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:* |
packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
www.openwall.com/lists/oss-security/2023/12/22/13
www.openwall.com/lists/oss-security/2023/12/22/6
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a
kernel.dance/317eb9685095678f2c9f5a8189de698c5354316a
lists.debian.org/debian-lts-announce/2024/01/msg00005.html