A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_trans_gc_catchall did not remove the catchall set element from the catchall_list when the argument sync is true, making it possible to free a catchall set element many times. We recommend upgrading past commit 93995bf4af2c5a99e2a87f0cd5ce547d31eb7630.
History

Thu, 13 Feb 2025 17:30:00 +0000

Type Values Removed Values Added
Description A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_trans_gc_catchall did not remove the catchall set element from the catchall_list when the argument sync is true, making it possible to free a catchall set element many times. We recommend upgrading past commit 93995bf4af2c5a99e2a87f0cd5ce547d31eb7630. A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_trans_gc_catchall did not remove the catchall set element from the catchall_list when the argument sync is true, making it possible to free a catchall set element many times. We recommend upgrading past commit 93995bf4af2c5a99e2a87f0cd5ce547d31eb7630.

cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-02-13T17:26:04.475Z

Reserved: 2023-11-13T20:25:06.272Z

Link: CVE-2023-6111

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-14T14:15:29.063

Modified: 2025-02-13T18:16:03.587

Link: CVE-2023-6111

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-11-14T00:00:00Z

Links: CVE-2023-6111 - Bugzilla