A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3623-1 | linux-5.10 security update |
Debian DSA |
DSA-5480-1 | linux security update |
Debian DSA |
DSA-5492-1 | linux security update |
EUVD |
EUVD-2023-53899 | A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system. |
Ubuntu USN |
USN-6315-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6316-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6318-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6321-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6325-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6328-1 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6330-1 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-6332-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6348-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6385-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6442-1 | Linux kernel (BlueField) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
This flaw can be mitigated by preventing the affected netfilter kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 22 Nov 2024 12:00:00 +0000
Fri, 13 Sep 2024 19:45:00 +0000
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-08T03:13:35.436Z
Reserved: 2023-07-30T11:58:17.241Z
Link: CVE-2023-4004
No data.
Status : Modified
Published: 2023-07-31T17:15:10.203
Modified: 2024-11-21T08:34:12.390
Link: CVE-2023-4004
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN