A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.

Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.

We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3512-1 linux-5.10 security update
Debian DLA Debian DLA DLA-3710-1 linux security update
Debian DSA Debian DSA DSA-5448-1 linux security update
Debian DSA Debian DSA DSA-5461-1 linux security update
EUVD EUVD EUVD-2023-44057 A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
Ubuntu USN Ubuntu USN USN-6246-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6250-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6251-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6252-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6254-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6255-1 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6260-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6261-1 Linux kernel (IoT) vulnerabilities
Ubuntu USN Ubuntu USN USN-6285-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6385-1 Linux kernel (OEM) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00081}

epss

{'score': 0.00095}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00077}

epss

{'score': 0.00081}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-02-13T16:55:10.098Z

Reserved: 2023-06-23T13:45:16.519Z

Link: CVE-2023-3390

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-06-28T21:15:10.447

Modified: 2024-11-21T08:17:09.960

Link: CVE-2023-3390

cve-icon Redhat

Severity : Important

Publid Date: 2023-06-08T00:00:00Z

Links: CVE-2023-3390 - Bugzilla

cve-icon OpenCVE Enrichment

No data.