NA

CVE-2023-6817

Published: 18/12/2023 Updated: 08/02/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Description<!---->A flaw was found in the Netfilter subsystem in the Linux kernel. A use-after-free condition is possible via the nft_pipapo_walk function. This issue may allow an malicious user to trigger an application crash, information disclosure, or local privilege escalation.A flaw was found in the Netfilter subsystem in the Linux kernel. A use-after-free condition is possible via the nft_pipapo_walk function. This issue may allow an malicious user to trigger an application crash, information disclosure, or local privilege escalation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 6.7

linux linux kernel

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for kernel is now available for Red Hat Enterprise Linux 86 Extended Update SupportRed Hat Product Securit ...
Description<!---->A flaw was found in the Netfilter subsystem in the Linux kernel A use-after-free condition is possible via the nft_pipapo_walk function This issue may allow an attacker to trigger an application crash, information disclosure, or local privilege escalationA flaw was found in the Netfilter subsystem in the Linux kernel A use-aft ...
An issue was discovered in the Linux kernel through 659 During a race with SQ thread exit, an io_uring/fdinfoc io_uring_show_fdinfo NULL pointer dereference can occur (CVE-2023-46862) An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel This flaw allows a remote attacker to send a crafted TCP packet, ...
A race condition leading to a use-after-free issue was found in the QXL driver in the Linux kernel (CVE-2023-39198) An issue was discovered in the Linux kernel through 659 During a race with SQ thread exit, an io_uring/fdinfoc io_uring_show_fdinfo NULL pointer dereference can occur (CVE-2023-46862) An out-of-bounds read vulnerability was foun ...
A race condition leading to a use-after-free issue was found in the QXL driver in the Linux kernel (CVE-2023-39198) An issue was discovered in the Linux kernel through 659 During a race with SQ thread exit, an io_uring/fdinfoc io_uring_show_fdinfo NULL pointer dereference can occur (CVE-2023-46862) An out-of-bounds read vulnerability was foun ...
An issue was discovered in the Linux kernel through 659 During a race with SQ thread exit, an io_uring/fdinfoc io_uring_show_fdinfo NULL pointer dereference can occur (CVE-2023-46862) An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel This flaw allows a remote attacker to send a crafted TCP packet, ...
An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access ...
The Stable channel is being updated to OS version:&nbsp;15699580&nbsp;Browser version:&nbsp;12106167159&nbsp;for most ChromeOS devicesIf you find new issues, please let us know one of the following waysFile a bugVisit our ChromeOS communitiesGeneral:&nbsp;Chromebook Help CommunityBeta Specific:&nbsp;ChromeOS Beta Help CommunityReport an issue ...
LTS-114&nbsp;is being updated in the LTS channel to&nbsp;11405735351 (Platform Version: 15437910)&nbsp;for most ChromeOS devices&nbsp;Want to know more about Long Term Support? Click&nbsp;hereThis update contains selective Security fixes, including:[40945671]&nbsp; &nbsp; &nbsp;High&nbsp;&nbsp;CVE-2024-0807&nbsp;Use after free in WebAudio[40 ...