CVE-2023-6817

Source
https://cve.org/CVERecord?id=CVE-2023-6817
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6817.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-6817
Downstream
Related
Published
2023-12-18T14:37:05.986Z
Modified
2026-05-01T04:21:44.272359Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Use-after-free in Linux kernel's netfilter: nf_tables component
Details

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The function nftpipapowalk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.

We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/6xxx/CVE-2023-6817.json",
    "cna_assigner": "Google",
    "cwe_ids": [
        "CWE-416"
    ]
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
Events
Introduced
7111951b8d4973bda27ff663f2cf18b663d15b48
Fixed
0dd3ee31125508cd67f7e7172247f05b7fd1753a
Database specific
{
    "source": "AFFECTED_FIELD",
    "extracted_events": [
        {
            "introduced": "5.6"
        },
        {
            "fixed": "6.7"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6817.json"