CVE-2023-4004

Summary

CVECVE-2023-4004
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-07-31 17:15:00 UTC
Updated2023-11-07 04:22:00 UTC
DescriptionA use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.

Risk And Classification

Problem Types: CWE-416

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Fedoraproject Fedora 38 All All All
Operating System Linux Linux Kernel All All All All
Operating System Linux Linux Kernel 6.5 rc1 All All
Operating System Linux Linux Kernel 6.5 rc2 All All
Operating System Linux Linux Kernel 6.5 rc3 All All
Operating System Linux Linux Kernel 6.5 rc4 All All
Operating System Redhat Enterprise Linux 8.0 All All All
Operating System Redhat Enterprise Linux 9.0 All All All

References

ReferenceSourceLinkTags
Red Hat MISC access.redhat.com
Red Hat MISC access.redhat.com
[SECURITY] [DLA 3623-1] linux-5.10 security update MISC lists.debian.org
Debian -- Security Information -- DSA-5480-1 linux MISC www.debian.org
[nf] netfilter: nft_set_pipapo: fix improper element removal - Patchwork MISC patchwork.ozlabs.org
Red Hat MISC access.redhat.com
cve-details MISC access.redhat.com
Red Hat MISC access.redhat.com
CVE-2023-4004 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security MISC security.netapp.com
Red Hat MISC access.redhat.com
Red Hat MISC access.redhat.com
Debian -- Security Information -- DSA-5492-1 linux MISC www.debian.org
Red Hat MISC access.redhat.com
Kernel Live Patch Security Notice LSN-0098-1 ≈ Packet Storm MISC packetstormsecurity.com
Red Hat MISC access.redhat.com
Red Hat MISC access.redhat.com
Red Hat MISC access.redhat.com
2225275 – (CVE-2023-4004) CVE-2023-4004 kernel: netfilter: nft_set_pipapo: improper element removal in function nft_pipapo_remove when insert an element without a NFT_SET_EXT_KEY_END that can lead to use-after-free MISC bugzilla.redhat.com
Red Hat MISC access.redhat.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 160912 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-5069)
  • 160934 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-5244)
  • 199764 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6385-1)
  • 199845 Ubuntu Security Notification for Linux kernel (BlueField) Vulnerabilities (USN-6442-1)
  • 242062 Red Hat Update for kpatch-patch (RHSA-2023:5221)
  • 242070 Red Hat Update for kernel security (RHSA-2023:5244)
  • 242075 Red Hat Update for kernel-rt (RHSA-2023:5255)
  • 242141 Red Hat Update for kpatch-patch (RHSA-2023:5548)
  • 242151 Red Hat Update for kernel security (RHSA-2023:5627)
  • 242481 Red Hat Update for kernel (RHSA-2023:7382)
  • 242483 Red Hat Update for kernel-rt (RHSA-2023:7389)
  • 242489 Red Hat Update for kpatch-patch (RHSA-2023:7411)
  • 242496 Red Hat Update for kpatch-patch (RHSA-2023:7417)
  • 242500 Red Hat Update for kernel-rt (RHSA-2023:7431)
  • 242504 Red Hat Update for kernel (RHSA-2023:7434)
  • 356571 Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-155
  • 378892 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0114)
  • 379043 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0136)
  • 6000212 Debian Security Update for linux (DSA 5480-1)
  • 6000220 Debian Security Update for linux (DSA 5492-1)
  • 6000265 Debian Security Update for linux-5.10 (DLA 3623-1)
  • 6140055 AWS Bottlerocket Security Update for kernel (GHSA-p683-h62f-x788)
  • 673484 EulerOS Security Update for kernel (EulerOS-SA-2023-3033)
  • 673732 EulerOS Security Update for kernel (EulerOS-SA-2023-3010)
  • 755107 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4095-1)
  • 755135 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP4) (SUSE-SU-2023:4166-1)
  • 755140 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5) (SUSE-SU-2023:4175-1)
  • 755154 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP4) (SUSE-SU-2023:4201-1)
  • 755168 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 33 for SLE 15 SP3) (SUSE-SU-2023:4219-1)
  • 755178 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 36 for SLE 15 SP3) (SUSE-SU-2023:4261-1)
  • 755179 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 35 for SLE 15 SP3) (SUSE-SU-2023:4260-1)
  • 755184 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 29 for SLE 15 SP3) (SUSE-SU-2023:4239-1)
  • 755186 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 4 for SLE 15 SP4) (SUSE-SU-2023:4267-1)
  • 755192 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 7 for SLE 15 SP4) (SUSE-SU-2023:4285-1)
  • 755210 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 8 for SLE 15 SP4) (SUSE-SU-2023:4308-1)
  • 755212 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) (SUSE-SU-2023:4326-1)
  • 755214 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 15 for SLE 15 SP4) (SUSE-SU-2023:4322-1)
  • 941249 AlmaLinux Security Update for kernel (ALSA-2023:5069)
  • 941254 AlmaLinux Security Update for kernel-rt (ALSA-2023:5091)
  • 941276 AlmaLinux Security Update for kernel (ALSA-2023:5244)
  • 961015 Rocky Linux Security Update for kernel-rt (RLSA-2023:5091)
  • 961022 Rocky Linux Security Update for kernel (RLSA-2023:5244)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report