CVE-2023-35001
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2023-35001 is a vulnerability in the Linux Kernel nftables implementation discovered in July 2023. The vulnerability stems from an out-of-bounds read/write flaw in the nft_byteorder expression processing. This bug was introduced by commit 96518518cc41 ("netfilter: add nftables") and has been present since Linux kernel version 3.13-rc1 (Openwall List).

Technical details

The vulnerability occurs when evaluating byteorder expressions with size 2, where a union with 32-bit and 16-bit members is used. Since the 16-bit members are aligned to 32-bit, the array accesses will be out-of-bounds, leading to a stack-out-of-bounds access. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.8 (HIGH) with the vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NetApp Advisory).

Impact

Successful exploitation of this vulnerability could lead to local privilege escalation, disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The impact is limited to systems where an attacker has CAPNETADMIN capability in any user or network namespace (Debian Advisory).

Mitigation and workarounds

A fix has been developed and distributed to various Linux distributions. For Debian bullseye, the issue has been fixed in version 5.10.179-2. For Ubuntu systems, multiple kernel versions have received patches including 5.15.0-78.85 for 22.04 LTS and 6.2.0-26.26 for newer releases (Debian Advisory, Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management