Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5492-1 | linux security update |
EUVD |
EUVD-2023-54424 | A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak. |
Ubuntu USN |
USN-6383-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6384-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6385-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6386-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6386-2 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-6386-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6466-1 | Linux kernel (NVIDIA) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is to skip loading the affected module "nftables" onto the system until we have a fix available. This can be done by a blacklist mechanism that will ensure the driver is not loaded at boot time. ~~~ How do I blacklist a kernel module to prevent it from loading automatically? https://access.redhat.com/solutions/41278 ~~~
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-02-27T21:03:29.416Z
Reserved: 2023-08-28T19:20:15.017Z
Link: CVE-2023-4569
Updated: 2024-08-02T07:31:06.509Z
Status : Modified
Published: 2023-08-28T22:15:10.487
Modified: 2024-11-21T08:35:26.850
Link: CVE-2023-4569
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN