ACK: [Jammy,OEM-5.17,OEM-6.0,OEM-6.1,Lunar 0/3] CVE-2023-4015

Stefan Bader stefan.bader at canonical.com
Fri Aug 4 07:59:56 UTC 2023


On 03.08.23 20:30, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> Unprivileged users may use nftables to cause a use-after-free, potentially
> leading to privilege escalation.
> 
> [Backport]
> This requires CVE-2023-3610 mitigations to be applied on 5.15 and later.
> 
> It also requires CVE-2023-3390 mitigations to be applied on OEM-5.17 and
> OEM-6.0.
> 
> A pre-requisite commit was necessary and a follow-up for it were also
> applied.
> 
> CVE-2023-3610 fix, pre-req and follow-up were already applied on oem-6.1,
> thus skipped there.
> 
> [Potential regression]
> nftables users may find regressions.
> 
> Pablo Neira Ayuso (3):
>    netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound
>      set/chain
>    netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
>    netfilter: nf_tables: unbind non-anonymous set if rule construction
>      fails
> 
>   include/net/netfilter/nf_tables.h |  2 ++
>   net/netfilter/nf_tables_api.c     | 47 ++++++++++++++++++++++++++-----
>   net/netfilter/nft_immediate.c     | 28 ++++++++++++------
>   3 files changed, 62 insertions(+), 15 deletions(-)
> 

Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 44613 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230804/6b1b97a2/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230804/6b1b97a2/attachment-0001.sig>


More information about the kernel-team mailing list