CVE-2023-35001

Summary

CVECVE-2023-35001
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-07-05 19:15:00 UTC
Updated2023-09-11 19:15:00 UTC
DescriptionLinux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace

Risk And Classification

Problem Types: CWE-787

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 11.0 All All All
Operating System Fedoraproject Fedora 37 All All All
Operating System Fedoraproject Fedora 38 All All All
Operating System Linux Linux Kernel 3.13 rc1 All All

References

ReferenceSourceLinkTags
CVE-2023-35001 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security MISC security.netapp.com
oss-security - CVE-2023-35001 - Linux kernel nf_tables nft_byteorder_eval OOB read/write MISC www.openwall.com
Kernel Live Patch Security Notice LSN-0097-1 ≈ Packet Storm MISC packetstormsecurity.com
[SECURITY] Fedora 38 Update: kernel-headers-6.4.4-200.fc38 - package-announce - Fedora Mailing-Lists MISC lists.fedoraproject.org
[PATCH] netfilter: nf_tables: prevent OOB access in nft_byteorder_eval MISC lore.kernel.org
[SECURITY] Fedora 37 Update: kernel-tools-6.4.4-100.fc37 - package-announce - Fedora Mailing-Lists MISC lists.fedoraproject.org
oss-security - CVE-2023-35001 - Linux kernel nf_tables nft_byteorder_eval OOB read/write MISC www.openwall.com
Kernel Live Patch Security Notice LSN-0096-1 ≈ Packet Storm MISC packetstormsecurity.com
[SECURITY] [DLA 3512-1] linux-5.10 security update MISC lists.debian.org
Debian -- Security Information -- DSA-5453-1 linux MISC www.debian.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 160912 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-5069)
  • 160934 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-5244)
  • 160949 Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2023-12842)
  • 160971 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-5622)
  • 199604 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6246-1)
  • 199607 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6247-1)
  • 199608 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6250-1)
  • 199610 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6248-1)
  • 199612 Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-6255-1)
  • 199613 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6251-1)
  • 199615 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6252-1)
  • 199617 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6254-1)
  • 199618 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6260-1)
  • 199623 Ubuntu Security Notification for Linux kernel (IoT) Vulnerabilities (USN-6261-1)
  • 199651 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6285-1)
  • 199874 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6460-1)
  • 242062 Red Hat Update for kpatch-patch (RHSA-2023:5221)
  • 242068 Red Hat Update for kernel (RHSA-2023:5238)
  • 242070 Red Hat Update for kernel security (RHSA-2023:5244)
  • 242073 Red Hat Update for kpatch-patch (RHSA-2023:5235)
  • 242075 Red Hat Update for kernel-rt (RHSA-2023:5255)
  • 242141 Red Hat Update for kpatch-patch (RHSA-2023:5548)
  • 242142 Red Hat Update for kpatch-patch (RHSA-2023:5575)
  • 242143 Red Hat Update for kpatch-patch (RHSA-2023:5574)
  • 242151 Red Hat Update for kernel security (RHSA-2023:5627)
  • 242154 Red Hat Update for kernel (RHSA-2023:5604)
  • 242157 Red Hat Update for kernel-rt (RHSA-2023:5603)
  • 242158 Red Hat Update for kernel (RHSA-2023:5622)
  • 242159 Red Hat Update for kernel-rt (RHSA-2023:5621)
  • 243055 Red Hat Update for kernel (RHSA-2024:1268)
  • 243057 Red Hat Update for kpatch-patch (RHSA-2024:1278)
  • 243058 Red Hat Update for kernel-rt (RHSA-2024:1269)
  • 257259 CentOS Security Update for kernel
  • 284333 Fedora Security Update for kernel (FEDORA-2023-e4e985b5dd)
  • 284334 Fedora Security Update for kernel (FEDORA-2023-3661f028b8)
  • 355566 Amazon Linux Security Advisory for kernel : ALAS-2023-1783
  • 355582 Amazon Linux Security Advisory for kernel : ALAS2-2023-2130
  • 355591 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.15-2023-024
  • 355613 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2023-049
  • 355616 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2023-037
  • 355632 Amazon Linux Security Advisory for kernel : ALAS2023-2023-251
  • 378701 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2023:0030)
  • 378710 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0079)
  • 379043 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0136)
  • 390290 Oracle Managed Virtualization (VM) Server for x86 Security Update for kernel (OVMSA-2023-0023)
  • 6000130 Debian Security Update for linux-5.10 (DLA 3512-1)
  • 6000218 Debian Security Update for linux (DSA 5453-1)
  • 6000429 Debian Security Update for linux (DLA 3710-1)
  • 6140409 AWS Bottlerocket Security Update for kernel (GHSA-qf27-gcxq-j6xr)
  • 673354 EulerOS Security Update for kernel (EulerOS-SA-2023-2843)
  • 673372 EulerOS Security Update for kernel (EulerOS-SA-2023-2787)
  • 673449 EulerOS Security Update for kernel (EulerOS-SA-2023-2898)
  • 673496 EulerOS Security Update for kernel (EulerOS-SA-2023-2860)
  • 673498 EulerOS Security Update for kernel (EulerOS-SA-2023-3132)
  • 673604 EulerOS Security Update for kernel (EulerOS-SA-2023-2811)
  • 673970 EulerOS Security Update for kernel (EulerOS-SA-2023-2879)
  • 754281 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3349-1)
  • 754829 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 24 for SLE 15 SP3) (SUSE-SU-2023:3594-1)
  • 754830 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 36 for SLE 15 SP1) (SUSE-SU-2023:3596-1)
  • 754831 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 27 for SLE 15 SP3) (SUSE-SU-2023:3595-1)
  • 754834 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 25 for SLE 15 SP3) (SUSE-SU-2023:3607-1)
  • 754835 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 37 for SLE 15 SP1) (SUSE-SU-2023:3603-1)
  • 754838 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 38 for SLE 15 SP2) (SUSE-SU-2023:3622-1)
  • 754839 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 37 for SLE 15 SP2) (SUSE-SU-2023:3621-1)
  • 754840 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 36 for SLE 15 SP2) (SUSE-SU-2023:3620-1)
  • 754841 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 29 for SLE 15 SP3) (SUSE-SU-2023:3623-1)
  • 754842 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 35 for SLE 15 SP2) (SUSE-SU-2023:3612-1)
  • 754844 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 32 for SLE 15 SP3) (SUSE-SU-2023:3628-1)
  • 754845 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 30 for SLE 15 SP3) (SUSE-SU-2023:3627-1)
  • 754846 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 34 for SLE 15 SP3) (SUSE-SU-2023:3632-1)
  • 754847 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 33 for SLE 15 SP3) (SUSE-SU-2023:3631-1)
  • 754848 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) (SUSE-SU-2023:3630-1)
  • 754851 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 14 for SLE 15 SP4) (SUSE-SU-2023:3653-1)
  • 754852 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 12 for SLE 15 SP4) (SUSE-SU-2023:3648-1)
  • 754853 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 11 for SLE 15 SP4) (SUSE-SU-2023:3647-1)
  • 754854 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 8 for SLE 15 SP4) (SUSE-SU-2023:3644-1)
  • 754857 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) (SUSE-SU-2023:3659-1)
  • 754859 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 13 for SLE 15 SP4) (SUSE-SU-2023:3657-1)
  • 754870 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP4) (SUSE-SU-2023:3677-1)
  • 754871 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5) (SUSE-SU-2023:3676-1)
  • 754872 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP4) (SUSE-SU-2023:3675-1)
  • 754873 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) (SUSE-SU-2023:3671-1)
  • 754874 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP4) (SUSE-SU-2023:3668-1)
  • 941249 AlmaLinux Security Update for kernel (ALSA-2023:5069)
  • 941254 AlmaLinux Security Update for kernel-rt (ALSA-2023:5091)
  • 941276 AlmaLinux Security Update for kernel (ALSA-2023:5244)
  • 961015 Rocky Linux Security Update for kernel-rt (RLSA-2023:5091)
  • 961022 Rocky Linux Security Update for kernel (RLSA-2023:5244)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report