{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-32233","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2025-05-05T15:58:00.672Z","dateReserved":"2023-05-05T00:00:00.000Z","datePublished":"2023-05-08T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-07-27T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://www.openwall.com/lists/oss-security/2023/05/08/4"},{"url":"https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab"},{"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab"},{"url":"https://news.ycombinator.com/item?id=35879660"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196105"},{"name":"DSA-5402","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2023/dsa-5402"},{"name":"[oss-security] 20230515 Re: [CVE-2023-32233] Linux kernel use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary reads and writes in kernel memory","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/05/15/5"},{"name":"[debian-lts-announce] 20230605 [SECURITY] [DLA 3446-1] linux-5.10 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html"},{"url":"https://security.netapp.com/advisory/ntap-20230616-0002/"},{"url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html"},{"name":"[debian-lts-announce] 20230727 [SECURITY] [DLA 3508-1] linux security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T15:10:23.978Z"},"title":"CVE Program Container","references":[{"url":"https://www.openwall.com/lists/oss-security/2023/05/08/4","tags":["x_transferred"]},{"url":"https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab","tags":["x_transferred"]},{"url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab","tags":["x_transferred"]},{"url":"https://news.ycombinator.com/item?id=35879660","tags":["x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196105","tags":["x_transferred"]},{"name":"DSA-5402","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2023/dsa-5402"},{"name":"[oss-security] 20230515 Re: [CVE-2023-32233] Linux kernel use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary reads and writes in kernel memory","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/05/15/5"},{"name":"[debian-lts-announce] 20230605 [SECURITY] [DLA 3446-1] linux-5.10 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html"},{"url":"https://security.netapp.com/advisory/ntap-20230616-0002/","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20230727 [SECURITY] [DLA 3508-1] linux security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-416","lang":"en","description":"CWE-416 Use After Free"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T13:28:27.494776Z","id":"CVE-2023-32233","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-05T15:58:00.672Z"}}]}}