// For flags

CVE-2023-32233

kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

5
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.

A use-after-free vulnerability was found in the Netfilter subsystem of the Linux kernel when processing batch requests to update nf_tables configuration. This vulnerability can be abused to perform arbitrary reads and writes in kernel memory. A local user (with CAP_NET_ADMIN capability) could use this flaw to crash the system or potentially escalate their privileges on the system.

It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges. It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform data buffer size validation in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly expose sensitive information. It was discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Various other issues were also addressed.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-05-05 CVE Reserved
  • 2023-05-08 CVE Published
  • 2023-05-16 First Exploit
  • 2024-08-02 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-416: Use After Free
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 3.13 < 4.14.315
Search vendor "Linux" for product "Linux Kernel" and version " >= 3.13 < 4.14.315"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.15 < 4.19.283
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.15 < 4.19.283"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.20 < 5.4.243
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.20 < 5.4.243"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.5 < 5.10.180
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.5 < 5.10.180"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.11 < 5.15.111
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.11 < 5.15.111"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.16 < 6.1.28
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.16 < 6.1.28"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 6.2 < 6.2.15
Search vendor "Linux" for product "Linux Kernel" and version " >= 6.2 < 6.2.15"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 6.3 < 6.3.2
Search vendor "Linux" for product "Linux Kernel" and version " >= 6.3 < 6.3.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
7.0
Search vendor "Redhat" for product "Enterprise Linux" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
8.0
Search vendor "Redhat" for product "Enterprise Linux" and version "8.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
9.0
Search vendor "Redhat" for product "Enterprise Linux" and version "9.0"
-
Affected
Netapp
Search vendor "Netapp"
Hci Baseboard Management Controller
Search vendor "Netapp" for product "Hci Baseboard Management Controller"
h300s
Search vendor "Netapp" for product "Hci Baseboard Management Controller" and version "h300s"
-
Affected
Netapp
Search vendor "Netapp"
Hci Baseboard Management Controller
Search vendor "Netapp" for product "Hci Baseboard Management Controller"
h410c
Search vendor "Netapp" for product "Hci Baseboard Management Controller" and version "h410c"
-
Affected
Netapp
Search vendor "Netapp"
Hci Baseboard Management Controller
Search vendor "Netapp" for product "Hci Baseboard Management Controller"
h410s
Search vendor "Netapp" for product "Hci Baseboard Management Controller" and version "h410s"
-
Affected
Netapp
Search vendor "Netapp"
Hci Baseboard Management Controller
Search vendor "Netapp" for product "Hci Baseboard Management Controller"
h500s
Search vendor "Netapp" for product "Hci Baseboard Management Controller" and version "h500s"
-
Affected
Netapp
Search vendor "Netapp"
Hci Baseboard Management Controller
Search vendor "Netapp" for product "Hci Baseboard Management Controller"
h700s
Search vendor "Netapp" for product "Hci Baseboard Management Controller" and version "h700s"
-
Affected