vulnerability

Ubuntu: (Multiple Advisories) (CVE-2023-3777): Linux kernel vulnerabilities

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Aug 29, 2023
Added
Aug 31, 2023
Modified
Feb 20, 2025

Description

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.

We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.

Solution(s)

ubuntu-upgrade-linux-image-5-15-0-1026-gkeopubuntu-upgrade-linux-image-5-15-0-1031-nvidiaubuntu-upgrade-linux-image-5-15-0-1031-nvidia-lowlatencyubuntu-upgrade-linux-image-5-15-0-1036-ibmubuntu-upgrade-linux-image-5-15-0-1036-raspiubuntu-upgrade-linux-image-5-15-0-1038-intel-iotgubuntu-upgrade-linux-image-5-15-0-1040-gcpubuntu-upgrade-linux-image-5-15-0-1040-gkeubuntu-upgrade-linux-image-5-15-0-1040-kvmubuntu-upgrade-linux-image-5-15-0-1041-oracleubuntu-upgrade-linux-image-5-15-0-1043-awsubuntu-upgrade-linux-image-5-15-0-1045-azureubuntu-upgrade-linux-image-5-15-0-1045-azure-fdeubuntu-upgrade-linux-image-5-15-0-82-genericubuntu-upgrade-linux-image-5-15-0-82-generic-64kubuntu-upgrade-linux-image-5-15-0-82-generic-lpaeubuntu-upgrade-linux-image-5-15-0-82-lowlatencyubuntu-upgrade-linux-image-5-15-0-82-lowlatency-64kubuntu-upgrade-linux-image-6-0-0-1021-oemubuntu-upgrade-linux-image-6-1-0-1020-oemubuntu-upgrade-linux-image-6-2-0-1003-starfiveubuntu-upgrade-linux-image-6-2-0-1008-ibmubuntu-upgrade-linux-image-6-2-0-1010-awsubuntu-upgrade-linux-image-6-2-0-1010-azureubuntu-upgrade-linux-image-6-2-0-1010-oracleubuntu-upgrade-linux-image-6-2-0-1011-kvmubuntu-upgrade-linux-image-6-2-0-1011-lowlatencyubuntu-upgrade-linux-image-6-2-0-1011-lowlatency-64kubuntu-upgrade-linux-image-6-2-0-1011-raspiubuntu-upgrade-linux-image-6-2-0-1012-gcpubuntu-upgrade-linux-image-6-2-0-31-genericubuntu-upgrade-linux-image-6-2-0-31-generic-64kubuntu-upgrade-linux-image-6-2-0-31-generic-lpaeubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-lts-22-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-cvmubuntu-upgrade-linux-image-azure-fde-lts-22-04ubuntu-upgrade-linux-image-azure-lts-22-04ubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-22-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lpae-hwe-22-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-15ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-intelubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-nvidiaubuntu-upgrade-linux-image-nvidia-lowlatencyubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-22-04bubuntu-upgrade-linux-image-oem-22-04cubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-22-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-starfiveubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-hwe-22-04
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.