CVE-2023-6111

Public on 2023-11-14
Modified on 2024-02-03
Description
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The function nft_trans_gc_catchall did not remove the catchall set element from the catchall_list when the argument sync is true, making it possible to free a catchall set element many times.

We recommend upgrading past commit 93995bf4af2c5a99e2a87f0cd5ce547d31eb7630.
Severity
Important severity
Important
CVSS v3 Base Score
7.8
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 kernel Not Affected
Amazon Linux 2 - Core kernel Not Affected
Amazon Linux 2 - Kernel-5.10 Extra kernel Not Affected
Amazon Linux 2 - Kernel-5.4 Extra kernel Not Affected
Amazon Linux 2 - Kernel-5.15 Extra kernel 2023-11-29 ALAS2KERNEL-5.15-2023-031 Fixed
Amazon Linux 2023 kernel 2023-12-13 ALAS2023-2023-461 Fixed
Amazon Linux 2023 kernel-livepatch-6.1.56-82.125 2023-12-06 ALAS2023LIVEPATCH-2023-021 Fixed
Amazon Linux 2023 kernel-livepatch-6.1.59-84.139 2023-12-06 ALAS2023LIVEPATCH-2023-022 Fixed
Amazon Linux 2023 kernel-livepatch-6.1.61-85.141 2023-12-06 ALAS2023LIVEPATCH-2023-020 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD CVSSv3 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H