[SRU][F/J/K/L][PATCH 0/1] CVE-2023-3390

Yuxuan Luo yuxuan.luo at canonical.com
Mon Jul 3 22:20:55 UTC 2023

A use-after-free vulnerability was found in the Linux kernel's netfilter
subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with
NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same
transaction causing a use-after-free vulnerability. This flaw allows a local
attacker with user access to cause a privilege escalation issue. 

For J/K/L, it is a clean cherry pick.
For Focal, the goto labels were modified in commit 3c5e44622011 ("netfilter:
nf_tables: memleak in hw offload abort path"), but since that is not a clean
cherry pick, the alternative approach is to backport the fix patch by
incorporate the new line added for 'err_release_rule' to the 'err2' label.

Compile and boot tested.

[Potential Regression]
Expect low regression potential.

Pablo Neira Ayuso (1):
  netfilter: nf_tables: incorrect error path handling with

 net/netfilter/nf_tables_api.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)


More information about the kernel-team mailing list