7.8
CVE-2023-32233
- EPSS 0.49%
- Published 08.05.2023 20:15:20
- Last modified 05.05.2025 16:15:39
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 3.13 < 4.14.315
Linux ≫ Linux Kernel Version >= 4.15 < 4.19.283
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.243
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.180
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.111
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.28
Linux ≫ Linux Kernel Version >= 6.2 < 6.2.15
Linux ≫ Linux Kernel Version >= 6.3 < 6.3.2
Redhat ≫ Enterprise Linux Version7.0
Redhat ≫ Enterprise Linux Version8.0
Redhat ≫ Enterprise Linux Version9.0
Netapp ≫ Hci Baseboard Management Controller Versionh300s
Netapp ≫ Hci Baseboard Management Controller Versionh410c
Netapp ≫ Hci Baseboard Management Controller Versionh410s
Netapp ≫ Hci Baseboard Management Controller Versionh500s
Netapp ≫ Hci Baseboard Management Controller Versionh700s
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.49% | 0.647 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-416 Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.