A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.
We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.
We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3711-1 | linux-5.10 security update |
Debian DSA |
DSA-5593-1 | linux security update |
Debian DSA |
DSA-5594-1 | linux security update |
EUVD |
EUVD-2023-59027 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free. We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a. |
Ubuntu USN |
USN-6606-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6607-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6608-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6608-2 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-6609-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6609-2 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-6609-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6628-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6628-2 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6635-1 | Linux kernel (GCP) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free. We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a. | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free. We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a. |
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T17:26:33.238Z
Reserved: 2023-12-14T11:29:13.252Z
Link: CVE-2023-6817
No data.
Status : Modified
Published: 2023-12-18T15:15:10.210
Modified: 2025-02-13T18:16:10.017
Link: CVE-2023-6817
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN