A use-after-free flaw was found in the Netfilter subsystem of the Linux kernel when processing named and anonymous sets in batch requests, which can lead to performing arbitrary reads and writes in kernel memory. This flaw allows a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system. References: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2227021]
The kernel fix in question is being backported as part of the series resolving for CVE-2023-3390. C9S/RHEL9 MR[1] is ready to be merged, RHEL8 MR[2] already merged. [1] https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-9/-/merge_requests/2770 [2] https://gitlab.com/redhat/rhel/src/kernel/rhel-8/-/merge_requests/4980
*** This bug has been marked as a duplicate of bug 2213260 ***
CVE-2023-3117 was rejected as duplicate of CVE-2023-3390