A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause an out-of-bounds read issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97. References: https://kernel.dance/1240eb93f0616b21c675416516ff3d74798fdc97 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2219131]
This was fixed for Fedora with the 6.3.9 stable kernel updates.
I think we can treat this as duplicate of CVE-2023-3117, the suggested fix is the same.
Thank you. Closing this one as duplicate of the flaw 2213260, so the CVE-2023-3390 is duplicate of the CVE-2023-3117 (and keeping original CVE-2023-3117 only). *** This bug has been marked as a duplicate of bug 2213260 ***