A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.
We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.
Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.
We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3711-1 | linux-5.10 security update |
Debian DSA |
DSA-5594-1 | linux security update |
EUVD |
EUVD-2023-57528 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325. |
Ubuntu USN |
USN-6443-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6444-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6444-2 | Linux kernel (StarFive) vulnerabilities |
Ubuntu USN |
USN-6445-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6445-2 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6446-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6446-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6446-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6454-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6454-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6454-3 | Linux kernel (ARM laptop) vulnerabilities |
Ubuntu USN |
USN-6454-4 | Linux kernel (StarFive) vulnerabilities |
Ubuntu USN |
USN-6466-1 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-6479-1 | Linux kernel (OEM) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 11 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux |
|
| CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Debian
Debian debian Linux |
Thu, 13 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325. | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325. |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T17:19:57.224Z
Reserved: 2023-09-26T09:43:24.384Z
Link: CVE-2023-5197
No data.
Status : Analyzed
Published: 2023-09-27T15:19:43.110
Modified: 2025-12-11T15:37:45.443
Link: CVE-2023-5197
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN