CVE-2023-52628
📋 TL;DR
This vulnerability in the Linux kernel's netfilter nftables exthdr component allows a 4-byte out-of-bounds stack write when processing network packets. Attackers with local or network access can exploit this to corrupt kernel memory, potentially leading to privilege escalation or denial of service. Systems running affected Linux kernel versions with nftables enabled are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, or arbitrary code execution with kernel privileges resulting in full system compromise.
Likely Case
Kernel crash causing denial of service, or limited privilege escalation from unprivileged user to root.
If Mitigated
Minimal impact if nftables is disabled or systems are properly segmented with network filtering.
🎯 Exploit Status
Exploitation requires sending specially crafted network packets to trigger the OOB write. The bug was reported by Zero Day Initiative, suggesting potential for weaponization.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in stable kernel commits referenced in CVE
Vendor Advisory: https://git.kernel.org/stable/c/1ad7b189cc1411048434e8595ffcbe7873b71082
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable nftables
linuxDisable nftables firewall subsystem if not required
systemctl stop nftables
systemctl disable nftables
Remove exthdr rules
linuxRemove any nftables rules using exthdr matching
nft delete rule <table> <chain> handle <handle>
nft flush ruleset
🧯 If You Can't Patch
- Implement network segmentation to limit access to vulnerable systems
- Use host-based firewalls (iptables) instead of nftables if possible
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if nftables is active: uname -r && systemctl status nftables
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is patched and nftables service status: uname -r | grep -E 'patched_version_pattern'
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- System crash/reboot events
- nftables rule processing errors
Network Indicators:
- Unusual network packets targeting nftables ports
- Traffic patterns attempting to trigger exthdr processing
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "nft") OR source="auth" AND event="reboot"
🔗 References
- https://git.kernel.org/stable/c/1ad7b189cc1411048434e8595ffcbe7873b71082
- https://git.kernel.org/stable/c/28a97c43c9e32f437ebb8d6126f9bb7f3ca9521a
- https://git.kernel.org/stable/c/a7d86a77c33ba1c357a7504341172cc1507f0698
- https://git.kernel.org/stable/c/c8f292322ff16b9a2272a67de396c09a50e09dce
- https://git.kernel.org/stable/c/cf39c4f77a773a547ac2bcf30ecdd303bb0c80cb
- https://git.kernel.org/stable/c/d9ebfc0f21377690837ebbd119e679243e0099cc
- https://git.kernel.org/stable/c/fd94d9dadee58e09b49075240fe83423eb1dcd36
- https://git.kernel.org/stable/c/1ad7b189cc1411048434e8595ffcbe7873b71082
- https://git.kernel.org/stable/c/28a97c43c9e32f437ebb8d6126f9bb7f3ca9521a
- https://git.kernel.org/stable/c/a7d86a77c33ba1c357a7504341172cc1507f0698
- https://git.kernel.org/stable/c/c8f292322ff16b9a2272a67de396c09a50e09dce
- https://git.kernel.org/stable/c/cf39c4f77a773a547ac2bcf30ecdd303bb0c80cb
- https://git.kernel.org/stable/c/d9ebfc0f21377690837ebbd119e679243e0099cc
- https://git.kernel.org/stable/c/fd94d9dadee58e09b49075240fe83423eb1dcd36
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html