First published: Mon Jul 24 2023(Updated: )
A flaw in the Linux Kernel found. For the netfilter, nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID can lead to use-after-free. Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <6.5 | |
Linux Linux kernel | =6.5-rc1 | |
Linux Linux kernel | =6.5-rc2 | |
Linux Linux kernel | =6.5-rc3 | |
Fedoraproject Fedora | =38 | |
Redhat Enterprise Linux | =9.0 | |
debian/linux | 4.19.249-2 4.19.289-2 5.10.197-1 5.10.205-2 6.1.66-1 6.1.69-1 6.5.13-1 6.6.9-1 | |
debian/linux-5.10 | 5.10.197-1~deb10u1 | |
redhat/Kernel | <6.5 | 6.5 |
>=5.9<5.10.190 | ||
>=5.11<5.15.124 | ||
>=5.16<6.1.43 | ||
>=6.2<6.4.8 | ||
=6.5-rc1 | ||
=6.5-rc2 | ||
=6.5-rc3 | ||
=38 | ||
=9.0 | ||
=9.2 | ||
=9.0 | ||
=9.0 | ||
=9.2 | ||
=10.0 | ||
=11.0 | ||
=12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-4147 is a use-after-free flaw found in the Linux kernel's Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID.
CVE-2023-4147 allows a local user to crash or escalate their privileges on the system.
CVE-2023-4147 has a severity rating of 7.8 (High).
Linux kernel versions 6.5 and earlier, Fedora 38, and Redhat Enterprise Linux 9.0 are affected by CVE-2023-4147.
Apply the recommended patches and updates provided by the respective vendors to mitigate CVE-2023-4147.