In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3446-1 | linux-5.10 security update |
Debian DLA |
DLA-3508-1 | linux security update |
Debian DSA |
DSA-5402-1 | linux security update |
EUVD |
EUVD-2023-36491 | In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled. |
Ubuntu USN |
USN-6122-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6123-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6124-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6127-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6130-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6131-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6132-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6135-1 | Linux kernel (Azure CVM) vulnerabilities |
Ubuntu USN |
USN-6149-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6150-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6162-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6175-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6186-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6222-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Ubuntu USN |
USN-6256-1 | Linux kernel (IoT) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 05 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-05T15:58:00.672Z
Reserved: 2023-05-05T00:00:00.000Z
Link: CVE-2023-32233
Updated: 2024-08-02T15:10:23.978Z
Status : Modified
Published: 2023-05-08T20:15:20.267
Modified: 2025-05-05T16:15:39.637
Link: CVE-2023-32233
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN