A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.
We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.
Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.
We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3623-1 | linux-5.10 security update |
Debian DLA |
DLA-3710-1 | linux security update |
EUVD |
EUVD-2023-54115 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability. We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8. |
Ubuntu USN |
USN-6444-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6444-2 | Linux kernel (StarFive) vulnerabilities |
Ubuntu USN |
USN-6445-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6445-2 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6446-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6446-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6446-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6461-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6466-1 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-6503-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6537-1 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-6572-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6681-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6681-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6681-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6681-4 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6716-1 | Linux kernel (Azure) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability. We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8. | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability. We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8. |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T17:09:20.006Z
Reserved: 2023-08-08T15:36:07.559Z
Link: CVE-2023-4244
No data.
Status : Modified
Published: 2023-09-06T14:15:11.877
Modified: 2025-02-13T17:17:16.750
Link: CVE-2023-4244
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN