CVE-2023-5197Use After Free in Kernel

CWE-416Use After Free21 documents10 sources
Severity
6.6MEDIUMNVD
CNA7.8
EPSS
0.1%
top 81.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 27
Latest updateJan 10

Description

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:HExploitability: 1.8 | Impact: 4.7

Affected Packages3 packages

CVEListV5linux/kernel5.96.6
NVDlinux/linux_kernel5.9.05.10.198+3
Debianlinux/linux_kernel< 5.10.205-2+3

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-5xr7-jj63-cqf7: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation2023-09-27
OSV
CVE-2023-5197: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation2023-09-27
CVEList
Use-after-free in Linux kernel's netfilter: nf_tables component2023-09-26

📋Vendor Advisories

16
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2023-51972024-01-10
Ubuntu
Kernel Live Patch Security Notice2023-11-28
Ubuntu
Linux kernel (OEM) vulnerabilities2023-11-14
Ubuntu
Linux kernel (StarFive) vulnerabilities2023-11-01
Ubuntu
Linux kernel (ARM laptop) vulnerabilities2023-10-31

💬Community

1
Bugzilla
CVE-2023-5197 kernel: netfilter: nf_tables: use-after-free due to addition and removal of rules from chain bindings within the same transaction2023-09-28
CVE-2023-5197 — Use After Free in Linux Kernel | cvebase