[ALPINE:CVE-2023-32233] linux-lts vulnerability
Severity
High
Affected Packages
15
Fixed Packages
15
CVEs
1
[From CVE-2023-32233] In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
- ID
- ALPINE:CVE-2023-32233
- Severity
- high
- Severity from
- CVE-2023-32233
- URL
- https://security.alpinelinux.org/vuln/CVE-2023-32233
- Published
-
2023-05-08T20:15:20
(16 months ago) - Modified
-
2023-05-08T20:15:20
(16 months ago) - Rights
- Alpine Linux Security Team
- Other Advisories
-
- ALAS-2023-1750
- ALAS2-2023-2050
- ALSA-2023:3349
- ALSA-2023:3723
- DSA-5402-1
- ELSA-2023-12393
- ELSA-2023-12394
- ELSA-2023-12412
- ELSA-2023-12413
- ELSA-2023-3349
- ELSA-2023-3723
- ELSA-2023-5622
- RHSA-2023:3349
- RHSA-2023:3350
- RHSA-2023:3351
- RHSA-2023:3705
- RHSA-2023:3708
- RHSA-2023:3723
- RHSA-2023:5574
- RHSA-2023:5621
- RHSA-2023:5622
- SSA:2023-172-02
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3594-1
- SUSE-SU-2023:3595-1
- SUSE-SU-2023:3607-1
- SUSE-SU-2023:3612-1
- SUSE-SU-2023:3620-1
- SUSE-SU-2023:3623-1
- SUSE-SU-2023:3627-1
- SUSE-SU-2023:3628-1
- SUSE-SU-2023:3630-1
- SUSE-SU-2023:3644-1
- SUSE-SU-2023:3647-1
- SUSE-SU-2023:3648-1
- SUSE-SU-2023:3668-1
- SUSE-SU-2023:3671-1
- SUSE-SU-2023:3675-1
- USN-6122-1
- USN-6123-1
- USN-6124-1
- USN-6127-1
- USN-6130-1
- USN-6131-1
- USN-6132-1
- USN-6135-1
- USN-6149-1
- USN-6150-1
- USN-6162-1
- USN-6175-1
- USN-6186-1
- USN-6222-1
- USN-6256-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Fixed | pkg:apk/alpine/linux-lts?arch=x86_64&distro=alpine-edge | alpine | linux-lts | = 6.1.27-r3 | alpine-edge | x86_64 | |
Affected | pkg:apk/alpine/linux-lts?arch=x86_64&distro=alpine-edge | alpine | linux-lts | < 6.1.27-r3 | alpine-edge | x86_64 | |
Fixed | pkg:apk/alpine/linux-lts?arch=x86_64&distro=alpine-3.18 | alpine | linux-lts | = 6.1.27-r3 | alpine-3.18 | x86_64 | |
Affected | pkg:apk/alpine/linux-lts?arch=x86_64&distro=alpine-3.18 | alpine | linux-lts | < 6.1.27-r3 | alpine-3.18 | x86_64 | |
Fixed | pkg:apk/alpine/linux-lts?arch=x86&distro=alpine-edge | alpine | linux-lts | = 6.1.27-r3 | alpine-edge | x86 | |
Affected | pkg:apk/alpine/linux-lts?arch=x86&distro=alpine-edge | alpine | linux-lts | < 6.1.27-r3 | alpine-edge | x86 | |
Fixed | pkg:apk/alpine/linux-lts?arch=x86&distro=alpine-3.18 | alpine | linux-lts | = 6.1.27-r3 | alpine-3.18 | x86 | |
Affected | pkg:apk/alpine/linux-lts?arch=x86&distro=alpine-3.18 | alpine | linux-lts | < 6.1.27-r3 | alpine-3.18 | x86 | |
Fixed | pkg:apk/alpine/linux-lts?arch=s390x&distro=alpine-edge | alpine | linux-lts | = 6.1.27-r3 | alpine-edge | s390x | |
Affected | pkg:apk/alpine/linux-lts?arch=s390x&distro=alpine-edge | alpine | linux-lts | < 6.1.27-r3 | alpine-edge | s390x | |
Fixed | pkg:apk/alpine/linux-lts?arch=s390x&distro=alpine-3.18 | alpine | linux-lts | = 6.1.27-r3 | alpine-3.18 | s390x | |
Affected | pkg:apk/alpine/linux-lts?arch=s390x&distro=alpine-3.18 | alpine | linux-lts | < 6.1.27-r3 | alpine-3.18 | s390x | |
Fixed | pkg:apk/alpine/linux-lts?arch=riscv64&distro=alpine-edge | alpine | linux-lts | = 6.1.27-r3 | alpine-edge | riscv64 | |
Affected | pkg:apk/alpine/linux-lts?arch=riscv64&distro=alpine-edge | alpine | linux-lts | < 6.1.27-r3 | alpine-edge | riscv64 | |
Fixed | pkg:apk/alpine/linux-lts?arch=ppc64le&distro=alpine-edge | alpine | linux-lts | = 6.1.27-r3 | alpine-edge | ppc64le | |
Affected | pkg:apk/alpine/linux-lts?arch=ppc64le&distro=alpine-edge | alpine | linux-lts | < 6.1.27-r3 | alpine-edge | ppc64le | |
Fixed | pkg:apk/alpine/linux-lts?arch=ppc64le&distro=alpine-3.18 | alpine | linux-lts | = 6.1.27-r3 | alpine-3.18 | ppc64le | |
Affected | pkg:apk/alpine/linux-lts?arch=ppc64le&distro=alpine-3.18 | alpine | linux-lts | < 6.1.27-r3 | alpine-3.18 | ppc64le | |
Fixed | pkg:apk/alpine/linux-lts?arch=armv7&distro=alpine-edge | alpine | linux-lts | = 6.1.27-r3 | alpine-edge | armv7 | |
Affected | pkg:apk/alpine/linux-lts?arch=armv7&distro=alpine-edge | alpine | linux-lts | < 6.1.27-r3 | alpine-edge | armv7 | |
Fixed | pkg:apk/alpine/linux-lts?arch=armv7&distro=alpine-3.18 | alpine | linux-lts | = 6.1.27-r3 | alpine-3.18 | armv7 | |
Affected | pkg:apk/alpine/linux-lts?arch=armv7&distro=alpine-3.18 | alpine | linux-lts | < 6.1.27-r3 | alpine-3.18 | armv7 | |
Fixed | pkg:apk/alpine/linux-lts?arch=armhf&distro=alpine-edge | alpine | linux-lts | = 6.1.27-r3 | alpine-edge | armhf | |
Affected | pkg:apk/alpine/linux-lts?arch=armhf&distro=alpine-edge | alpine | linux-lts | < 6.1.27-r3 | alpine-edge | armhf | |
Fixed | pkg:apk/alpine/linux-lts?arch=armhf&distro=alpine-3.18 | alpine | linux-lts | = 6.1.27-r3 | alpine-3.18 | armhf | |
Affected | pkg:apk/alpine/linux-lts?arch=armhf&distro=alpine-3.18 | alpine | linux-lts | < 6.1.27-r3 | alpine-3.18 | armhf | |
Fixed | pkg:apk/alpine/linux-lts?arch=aarch64&distro=alpine-edge | alpine | linux-lts | = 6.1.27-r3 | alpine-edge | aarch64 | |
Affected | pkg:apk/alpine/linux-lts?arch=aarch64&distro=alpine-edge | alpine | linux-lts | < 6.1.27-r3 | alpine-edge | aarch64 | |
Fixed | pkg:apk/alpine/linux-lts?arch=aarch64&distro=alpine-3.18 | alpine | linux-lts | = 6.1.27-r3 | alpine-3.18 | aarch64 | |
Affected | pkg:apk/alpine/linux-lts?arch=aarch64&distro=alpine-3.18 | alpine | linux-lts | < 6.1.27-r3 | alpine-3.18 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |