First published: Tue Sep 26 2023(Updated: )
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=5.9.0<6.6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.6-1 6.12.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this use-after-free vulnerability in the Linux kernel is CVE-2023-5197.
The affected software is the Linux kernel with versions from 5.9.0 to 6.6.
The severity of this vulnerability is high with a severity value of 7.8.
This vulnerability can be exploited to achieve local privilege escalation.
We recommend upgrading to a version past commit f15f29fd4779b to fix this vulnerability.