CVE-2023-54243Use After Free in Linux

CWE-416Use After Free7 documents6 sources
Severity
5.3MEDIUM
No vector
EPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: ebtables: fix table blob use-after-free We are not allowed to return an error at this point. Looking at the code it looks like ret is always 0 at this point, but its not. t = find_table_lock(net, repl->name, &ret, &ebt_mutex); ... this can return a valid table, with ret != 0. This bug causes update of table->private with the new blob, but then frees the blob right away in the caller. Syzbot report: BUG: KASAN:

Affected Packages4 packages

Linuxlinux/linux_kernel3.15.05.10.173+3
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxc58dd2dd443c26d856a168db108a0cd11c285bf39060abce3305ab2354c892c09d5689df51486df5+10
debiandebian/linux< linux 6.1.20-1 (bookworm)

🔴Vulnerability Details

3
OSV
netfilter: ebtables: fix table blob use-after-free2025-12-30
OSV
CVE-2023-54243: In the Linux kernel, the following vulnerability has been resolved: netfilter: ebtables: fix table blob use-after-free We are not allowed to return an2025-12-30
GHSA
GHSA-2hrc-j4gc-h2p8: In the Linux kernel, the following vulnerability has been resolved: netfilter: ebtables: fix table blob use-after-free We are not allowed to return2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: netfilter: ebtables: fix table blob use-after-free2025-12-30
Debian
CVE-2023-54243: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54243 Impact, Exploitability, and Mitigation Steps | Wiz