CVE-2023-4004Use After Free in Kernel

CWE-416Use After Free33 documents10 sources
Severity
7.8HIGHNVD
OSV6.5OSV4.7
EPSS
0.0%
top 96.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 31
Latest updateFeb 14

Description

A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.65.10.188+3
Debianlinux/linux_kernel< 5.10.191-1+3
Ubuntulinux/linux_kernel< 5.15.0-82.91+8
Palo Altopaloalto/pan-os

Also affects: Debian Linux 10.0, 11.0, 12.0, Enterprise Linux 8.0, 9.0, Fedora 38

Patches

🔴Vulnerability Details

14
OSV
Kernel Live Patch Security Notice2023-11-28
OSV
linux-bluefield vulnerabilities2023-10-19
OSV
Kernel Live Patch Security Notice2023-10-10
OSV
linux-oem-6.0 vulnerabilities2023-09-19
OSV
linux-intel-iotg-5.15, linux-raspi vulnerabilities2023-09-06

📋Vendor Advisories

17
Palo Alto
PAN-SA-2024-0001 Informational Bulletin: Impact of OSS CVEs in PAN-OS2024-02-14
Ubuntu
Kernel Live Patch Security Notice2023-11-28
Ubuntu
Linux kernel (BlueField) vulnerabilities2023-10-19
Ubuntu
Kernel Live Patch Security Notice2023-10-10
Ubuntu
Linux kernel (OEM) vulnerabilities2023-09-19

💬Community

1
Bugzilla
CVE-2023-4004 kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove()2023-07-24