Description
A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.
Published: 2023-07-31
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

This flaw can be mitigated by preventing the affected netfilter kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3623-1 linux-5.10 security update
Debian DSA Debian DSA DSA-5480-1 linux security update
Debian DSA Debian DSA DSA-5492-1 linux security update
EUVD EUVD EUVD-2023-53899 A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.
Ubuntu USN Ubuntu USN USN-6315-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6316-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6318-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6321-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6325-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6328-1 Linux kernel (Oracle) vulnerabilities
Ubuntu USN Ubuntu USN USN-6330-1 Linux kernel (GCP) vulnerabilities
Ubuntu USN Ubuntu USN USN-6332-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6348-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6385-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6442-1 Linux kernel (BlueField) vulnerabilities
References
Link Providers
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html cve-icon
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html cve-icon
https://access.redhat.com/errata/RHSA-2023:4961 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:4962 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:4967 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:5069 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:5091 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:5093 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:5221 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:5244 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:5255 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:5548 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:5627 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7382 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7389 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7411 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7417 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7431 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2023:7434 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2023-4004 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2225275 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2023-4004 cve-icon
https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230719190824.21196-1-fw@strlen.de/ cve-icon cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20231027-0001/ cve-icon
https://www.cve.org/CVERecord?id=CVE-2023-4004 cve-icon
https://www.debian.org/security/2023/dsa-5480 cve-icon
https://www.debian.org/security/2023/dsa-5492 cve-icon

Subscriptions

Debian Debian Linux
Fedoraproject Fedora
Linux Linux Kernel
Netapp H300s H410s H500s H700s
Redhat Enterprise Linux Rhel Aus Rhel E4s Rhel Eus Rhel Tus Rhev Hypervisor
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-08T03:13:35.436Z

Reserved: 2023-07-30T11:58:17.241Z

Link: CVE-2023-4004

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-07-31T17:15:10.203

Modified: 2024-11-21T08:34:12.390

Link: CVE-2023-4004

cve-icon Redhat

Severity : Important

Publid Date: 2023-07-19T00:00:00Z

Links: CVE-2023-4004 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses