A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nftablesapi.c.
Mishandled error handling with NFTMSGNEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.
We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
[
{
"events": [
{
"introduced": "3.16"
},
{
"fixed": "4.14.322"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.19.291"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "5.4.251"
}
]
},
{
"events": [
{
"introduced": "5.5"
},
{
"fixed": "5.10.188"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.15.118"
}
]
},
{
"events": [
{
"introduced": "5.16"
},
{
"fixed": "6.1.35"
}
]
},
{
"events": [
{
"introduced": "6.2"
},
{
"fixed": "6.3.9"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-3390.json"