A flaw in the Linux Kernel found. A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered. Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=4bedf9eee016286c835e3d8fa981ddece5338795
I just noticed (actually, CKI KWF Bot did) that I had backported the proposed fix on behalf of CVE-2023-3390[1] already, or at least for the RHEL9.3 clone[2]. But since this CVE-2023-3610 does not apply to RHEL8 and there are also 9.2.0.z[3] and 9.0.0.z[4] clones for CVE-2023-3390, the same merge request may at least be reused. I am a bit at a loss though how to deal with the ticket(s) created for this CVE. Close as duplicate? Mark as TestOnly and depend on the respective other ones? [1] https://bugzilla.redhat.com/show_bug.cgi?id=2213260 [2] https://bugzilla.redhat.com/show_bug.cgi?id=2213271 [3] https://bugzilla.redhat.com/show_bug.cgi?id=2216160 [4] https://bugzilla.redhat.com/show_bug.cgi?id=2216159
In reply to comment #7: > I just noticed (actually, CKI KWF Bot did) that I had backported the proposed > fix on behalf of CVE-2023-3390[1] already, or at least for > the RHEL9.3 clone[2]. But since this CVE-2023-3610 does not apply to RHEL8 > and > there are also 9.2.0.z[3] and 9.0.0.z[4] clones for CVE-2023-3390, the same > merge request may at least be reused. > > I am a bit at a loss though how to deal with the ticket(s) created for this > CVE. Close as duplicate? Mark as TestOnly and depend on the respective other > ones? > > [1] https://bugzilla.redhat.com/show_bug.cgi?id=2213260 > [2] https://bugzilla.redhat.com/show_bug.cgi?id=2213271 > [3] https://bugzilla.redhat.com/show_bug.cgi?id=2216160 > [4] https://bugzilla.redhat.com/show_bug.cgi?id=2216159 Yes, let's close bugzilla trackers as duplicate. The status for CVE page should be correct then I think. The TestOnly I think should be Ok too.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:5091 https://access.redhat.com/errata/RHSA-2023:5091
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:5093 https://access.redhat.com/errata/RHSA-2023:5093
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:5069 https://access.redhat.com/errata/RHSA-2023:5069