CVE-2023-6817

Public on 2023-12-18
Modified on 2024-04-02
Description
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.

We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
Severity
Important severity
Important
CVSS v3 Base Score
7.8
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 kernel Not Affected
Amazon Linux 2 - Core kernel Not Affected
Amazon Linux 2 - Kernel-5.4 Extra kernel Not Affected
Amazon Linux 2 - Kernel-5.10 Extra kernel 2024-01-05 ALAS2KERNEL-5.10-2024-045 Fixed
Amazon Linux 2 - Kernel-5.10 Extra kernel 2024-01-19 ALAS2KERNEL-5.10-2024-047 Fixed
Amazon Linux 2 - Kernel-5.15 Extra kernel 2024-01-05 ALAS2KERNEL-5.15-2024-033 Fixed
Amazon Linux 2 - Kernel-5.15 Extra kernel 2024-01-19 ALAS2KERNEL-5.15-2024-035 Fixed
Amazon Linux 2023 kernel 2024-01-19 ALAS2023-2024-488 Fixed
Amazon Linux 2 - Livepatch Extra kernel-livepatch-5.10.201-191.748 2024-02-29 ALAS2LIVEPATCH-2024-167 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD CVSSv3 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H