Описание
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
Ссылки
- PatchThird Party Advisory
- Mailing ListThird Party Advisory
- Issue TrackingMitigationThird Party Advisory
- Mailing ListPatch
- Patch
- Third Party Advisory
- Mailing ListThird Party Advisory
- Issue Tracking
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListPatchThird Party Advisory
- PatchThird Party Advisory
- Mailing ListThird Party Advisory
- Issue TrackingMitigationThird Party Advisory
- Mailing ListPatch
- Patch
- Third Party Advisory
- Mailing ListThird Party Advisory
- Issue Tracking
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
EPSS
7.8 High
CVSS3
Дефекты
Связанные уязвимости
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_ta ...
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
EPSS
7.8 High
CVSS3