vulnerability

Amazon Linux 2023: CVE-2023-5197: Important priority package update for kernel (Multiple Advisories)

Severity
6
CVSS
(AV:L/AC:L/Au:S/C:P/I:P/A:C)
Published
Sep 27, 2023
Added
Feb 17, 2025
Modified
Jul 4, 2025

Description

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.
We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.
A use-after-free vulnerability was found in net/netfilter/nf_tables_api.c in the netfilter component in the Linux Kernel. This flaw can be exploited to achieve local privilege escalation. Adding and removing rules from chain bindings within the same transaction leads to a use-after-free issue.

Solutions

amazon-linux-2023-upgrade-bpftoolamazon-linux-2023-upgrade-bpftool-debuginfoamazon-linux-2023-upgrade-kernelamazon-linux-2023-upgrade-kernel-debuginfoamazon-linux-2023-upgrade-kernel-debuginfo-common-aarch64amazon-linux-2023-upgrade-kernel-debuginfo-common-x86-64amazon-linux-2023-upgrade-kernel-develamazon-linux-2023-upgrade-kernel-headersamazon-linux-2023-upgrade-kernel-libbpfamazon-linux-2023-upgrade-kernel-libbpf-develamazon-linux-2023-upgrade-kernel-libbpf-staticamazon-linux-2023-upgrade-kernel-livepatch-6-1-49-69-116amazon-linux-2023-upgrade-kernel-livepatch-6-1-49-70-116amazon-linux-2023-upgrade-kernel-livepatch-6-1-52-71-125amazon-linux-2023-upgrade-kernel-livepatch-6-1-55-75-123amazon-linux-2023-upgrade-kernel-livepatch-6-1-56-82-125amazon-linux-2023-upgrade-kernel-modules-extraamazon-linux-2023-upgrade-kernel-toolsamazon-linux-2023-upgrade-kernel-tools-debuginfoamazon-linux-2023-upgrade-kernel-tools-develamazon-linux-2023-upgrade-perfamazon-linux-2023-upgrade-perf-debuginfoamazon-linux-2023-upgrade-python3-perfamazon-linux-2023-upgrade-python3-perf-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.