A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5593-1 linux security update
EUVD EUVD EUVD-2023-58845 A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.
Ubuntu USN Ubuntu USN USN-6624-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6626-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6626-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6626-3 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6628-1 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6628-2 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6639-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6652-1 Linux kernel (Azure) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is to skip loading the affected module "netfilter" onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time. ~~~ How do I blacklist a kernel module to prevent it from loading automatically? https://access.redhat.com/solutions/41278

History

Wed, 25 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Fedoraproject
Fedoraproject fedora
CPEs cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
Vendors & Products Fedoraproject
Fedoraproject fedora

Fri, 22 Nov 2024 12:00:00 +0000


Sat, 14 Sep 2024 00:45:00 +0000


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-09-25T13:22:41.214Z

Reserved: 2023-12-08T11:50:45.757Z

Link: CVE-2023-6622

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2023-12-08T18:15:07.163

Modified: 2025-06-25T20:52:54.067

Link: CVE-2023-6622

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-12-08T11:56:00Z

Links: CVE-2023-6622 - Bugzilla

cve-icon OpenCVE Enrichment

No data.