Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DSA-5593-1 | linux security update |
![]() |
EUVD-2023-58845 | A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service. |
![]() |
USN-6624-1 | Linux kernel vulnerabilities |
![]() |
USN-6626-1 | Linux kernel vulnerabilities |
![]() |
USN-6626-2 | Linux kernel vulnerabilities |
![]() |
USN-6626-3 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6628-1 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-6628-2 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-6639-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-6652-1 | Linux kernel (Azure) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is to skip loading the affected module "netfilter" onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time. ~~~ How do I blacklist a kernel module to prevent it from loading automatically? https://access.redhat.com/solutions/41278
Wed, 25 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fedoraproject
Fedoraproject fedora |
|
CPEs | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
|
Vendors & Products |
Fedoraproject
Fedoraproject fedora |
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sat, 14 Sep 2024 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-09-25T13:22:41.214Z
Reserved: 2023-12-08T11:50:45.757Z
Link: CVE-2023-6622

No data.

Status : Analyzed
Published: 2023-12-08T18:15:07.163
Modified: 2025-06-25T20:52:54.067
Link: CVE-2023-6622


No data.