CVE-2023-3390
moderate-risk
Published 2023-06-28
A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
Do I need to act?
-
0.10% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (6)
References (16)
Third Party Advisory
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LS...
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230818-0004/
Third Party Advisory
https://www.debian.org/security/2023/dsa-5448
Third Party Advisory
https://www.debian.org/security/2023/dsa-5461
Third Party Advisory
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LS...
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230818-0004/
Third Party Advisory
https://www.debian.org/security/2023/dsa-5448
Third Party Advisory
https://www.debian.org/security/2023/dsa-5461
37
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
13/34 · Low