A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.
Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.
We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.
We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3512-1 | linux-5.10 security update |
Debian DLA |
DLA-3710-1 | linux security update |
Debian DSA |
DSA-5448-1 | linux security update |
Debian DSA |
DSA-5461-1 | linux security update |
EUVD |
EUVD-2023-44057 | A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97. |
Ubuntu USN |
USN-6246-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6250-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6251-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6252-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6254-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6255-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6260-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6261-1 | Linux kernel (IoT) vulnerabilities |
Ubuntu USN |
USN-6285-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6385-1 | Linux kernel (OEM) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T16:55:10.098Z
Reserved: 2023-06-23T13:45:16.519Z
Link: CVE-2023-3390
No data.
Status : Modified
Published: 2023-06-28T21:15:10.447
Modified: 2024-11-21T08:17:09.960
Link: CVE-2023-3390
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN