First published: Mon May 08 2023(Updated: )
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 | |
redhat/kernel | <6.4 | 6.4 |
Linux Kernel | >=3.13<4.14.315 | |
Linux Kernel | >=4.15<4.19.283 | |
Linux Kernel | >=4.20<5.4.243 | |
Linux Kernel | >=5.5<5.10.180 | |
Linux Kernel | >=5.11<5.15.111 | |
Linux Kernel | >=5.16<6.1.28 | |
Linux Kernel | >=6.2<6.2.15 | |
Linux Kernel | >=6.3<6.3.2 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
netapp hci baseboard management controller | =h300s | |
netapp hci baseboard management controller | =h410c | |
netapp hci baseboard management controller | =h410s | |
netapp hci baseboard management controller | =h500s | |
netapp hci baseboard management controller | =h700s | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32233 has been classified as a critical vulnerability due to the potential for unprivileged local users to obtain root privileges.
To fix CVE-2023-32233, update the Linux kernel to version 6.3.2 or later, or apply specific patches provided by your Linux distribution.
CVE-2023-32233 impacts various versions of the Linux kernel, specifically versions prior to 6.3.2, including several distributions like Red Hat and Debian.
CVE-2023-32233 is a use-after-free vulnerability in the Netfilter nf_tables subsystem of the Linux kernel.
CVE-2023-32233 cannot be exploited remotely as it requires unprivileged local users to access the vulnerable system.