CVE-2023-4147

CVSS v3.1 7.8 (High)
78% Progress
EPSS 0.04 % (11th)
0.04% Progress
Affected Products 8
Advisories 37
NVD Status Analyzed

A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.

Weaknesses
CWE-416
Use After Free
Related CVEs
CVE Status
PUBLISHED
NVD Status
Analyzed
CNA
Red Hat, Inc.
Published Date
2023-08-07 14:15:11
(13 months ago)
Updated Date
2024-08-26 16:08:14
(3 weeks ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel from 5.9 version and prior 5.10.190 version cpe:2.3:o:linux:linux_kernel >= 5.9 < 5.10.190
  Linux Kernel from 5.11 version and prior 5.15.124 version cpe:2.3:o:linux:linux_kernel >= 5.11 < 5.15.124
  Linux Kernel from 5.16 version and prior 6.1.43 version cpe:2.3:o:linux:linux_kernel >= 5.16 < 6.1.43
  Linux Kernel from 6.2 version and prior 6.4.8 version cpe:2.3:o:linux:linux_kernel >= 6.2 < 6.4.8
  Linux Kernel 6.5 Rc1 cpe:2.3:o:linux:linux_kernel:6.5:rc1
  Linux Kernel 6.5 Rc2 cpe:2.3:o:linux:linux_kernel:6.5:rc2
  Linux Kernel 6.5 Rc3 cpe:2.3:o:linux:linux_kernel:6.5:rc3

Configuration #2

    CPE23 From Up To
  Fedoraproject Fedora 38 cpe:2.3:o:fedoraproject:fedora:38

Configuration #3

    CPE23 From Up To
  Redhat Enterprise Linux 9.0 cpe:2.3:o:redhat:enterprise_linux:9.0
  Redhat Enterprise Linux Eus 9.2 cpe:2.3:o:redhat:enterprise_linux_eus:9.2
  Redhat Enterprise Linux for Real Time 9.0 cpe:2.3:o:redhat:enterprise_linux_for_real_time:9.0
  Redhat Enterprise Linux for Real Time For Nfv 9.0 cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:9.0
  Redhat Enterprise Linux Server Aus 9.2 cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2

Configuration #4

    CPE23 From Up To
  Debian Linux 10.0 cpe:2.3:o:debian:debian_linux:10.0
  Debian Linux 11.0 cpe:2.3:o:debian:debian_linux:11.0
  Debian Linux 12.0 cpe:2.3:o:debian:debian_linux:12.0
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...