7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:P/I:P/A:P
0.0004 Low
EPSS
Percentile
5.3%
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables
when processing batch requests can be abused to perform arbitrary read and
write operations on kernel memory. Unprivileged local users can obtain root
privileges. This occurs because anonymous sets are mishandled.
Author | Note |
---|---|
cascardo | requires CAP_NET_ADMIN, however this can be done within a new user namespace and network namespace - so can be mitigated by disabling unprivileged user namespaces. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-212.223 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-150.167 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-73.80 | UNKNOWN |
ubuntu | 22.10 | noarch | linux | < 5.19.0-43.44 | UNKNOWN |
ubuntu | 23.04 | noarch | linux | < 6.2.0-23.23 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-241.275) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1157.170 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1103.111 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1037.41 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2023-32233
nvd.nist.gov/vuln/detail/CVE-2023-32233
security-tracker.debian.org/tracker/CVE-2023-32233
ubuntu.com/security/notices/USN-6122-1
ubuntu.com/security/notices/USN-6123-1
ubuntu.com/security/notices/USN-6124-1
ubuntu.com/security/notices/USN-6127-1
ubuntu.com/security/notices/USN-6130-1
ubuntu.com/security/notices/USN-6131-1
ubuntu.com/security/notices/USN-6132-1
ubuntu.com/security/notices/USN-6135-1
ubuntu.com/security/notices/USN-6149-1
ubuntu.com/security/notices/USN-6150-1
ubuntu.com/security/notices/USN-6162-1
ubuntu.com/security/notices/USN-6175-1
ubuntu.com/security/notices/USN-6186-1
ubuntu.com/security/notices/USN-6222-1
ubuntu.com/security/notices/USN-6256-1
www.cve.org/CVERecord?id=CVE-2023-32233
www.openwall.com/lists/oss-security/2023/05/08/4
www.openwall.com/lists/oss-security/2023/05/15/5
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:P/I:P/A:P
0.0004 Low
EPSS
Percentile
5.3%