First published: Wed Sep 06 2023(Updated: )
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. On an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() can lead unbinding the chain and objects be deactivated but later used. We recommend upgrading past commit 0a771f7b266b02d262900c75f1e175c7fe76fec2.
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Kernel | <6.5 | 6.5 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Linux kernel | >=5.9<5.10.190 | |
Linux kernel | >=5.11<5.15.124 | |
Linux kernel | >=5.16<6.1.43 | |
Linux kernel | >=6.2<6.4.8 | |
Debian | =12.0 | |
Linux kernel | <=6.5 |
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-4015 is relatively high due to its potential for local privilege escalation.
To fix CVE-2023-4015, update the Linux kernel to version 6.5 or apply the necessary patches as specified by your distribution.
CVE-2023-4015 affects various versions of the Linux kernel, specifically from 5.9 to 6.5, and certain Debian Linux versions.
CVE-2023-4015 is classified as a use-after-free vulnerability in the netfilter nf_tables component.
CVE-2023-4015 is primarily a local privilege escalation vulnerability and cannot be exploited remotely.