cve/2023/CVE-2023-3390.md

22 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-3390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390)
![](https://img.shields.io/static/v1?label=Product&message=Linux%20Kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.16%3C%206.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brighgreen)
### Description
A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
### POC
#### Reference
- http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
#### Github
- https://github.com/c0m0r1/c0m0r1
2024-05-28 08:49:17 +00:00
- https://github.com/fkie-cad/nvd-json-data-feeds
2024-08-06 19:19:10 +00:00
- https://github.com/leesh3288/leesh3288
2024-06-07 04:52:01 +00:00
- https://github.com/tanjiti/sec_profile
2024-05-25 21:48:12 +02:00
- https://github.com/xairy/linux-kernel-exploitation