CVE-2023-5972

CVSS v3.1 7.8 (High)
78% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 2
Advisories 2

A null pointer dereference flaw was found in the nft_inner.c functionality of netfilter in the Linux kernel. This issue could allow a local user to crash the system or escalate their privileges on the system.

Weaknesses
CWE-476
NULL Pointer Dereference
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2023-11-23 18:15:07
(9 months ago)
Updated Date
2023-11-30 20:31:31
(9 months ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel from 6.2.1 version and 6.5.10 and prior versions cpe:2.3:o:linux:linux_kernel >= 6.2.1 <= 6.5.10
  Linux Kernel 6.2 Rc1 cpe:2.3:o:linux:linux_kernel:6.2:rc1
  Linux Kernel 6.2 Rc2 cpe:2.3:o:linux:linux_kernel:6.2:rc2
  Linux Kernel 6.2 Rc3 cpe:2.3:o:linux:linux_kernel:6.2:rc3
  Linux Kernel 6.2 Rc4 cpe:2.3:o:linux:linux_kernel:6.2:rc4
  Linux Kernel 6.2 Rc5 cpe:2.3:o:linux:linux_kernel:6.2:rc5
  Linux Kernel 6.2 Rc6 cpe:2.3:o:linux:linux_kernel:6.2:rc6
  Linux Kernel 6.2 Rc7 cpe:2.3:o:linux:linux_kernel:6.2:rc7
  Linux Kernel 6.2 Rc8 cpe:2.3:o:linux:linux_kernel:6.2:rc8
  Linux Kernel 6.2.0 Rc1 cpe:2.3:o:linux:linux_kernel:6.2.0:rc1
  Linux Kernel 6.2.0 Rc2 cpe:2.3:o:linux:linux_kernel:6.2.0:rc2
  Linux Kernel 6.2.0 Rc3 cpe:2.3:o:linux:linux_kernel:6.2.0:rc3
  Linux Kernel 6.2.0 Rc4 cpe:2.3:o:linux:linux_kernel:6.2.0:rc4
  Linux Kernel 6.2.0 Rc5 cpe:2.3:o:linux:linux_kernel:6.2.0:rc5
  Linux Kernel 6.2.0 Rc6 cpe:2.3:o:linux:linux_kernel:6.2.0:rc6
  Linux Kernel 6.6 Rc1 cpe:2.3:o:linux:linux_kernel:6.6:rc1
  Linux Kernel 6.6 Rc2 cpe:2.3:o:linux:linux_kernel:6.6:rc2
  Linux Kernel 6.6 Rc3 cpe:2.3:o:linux:linux_kernel:6.6:rc3
  Linux Kernel 6.6 Rc4 cpe:2.3:o:linux:linux_kernel:6.6:rc4
  Linux Kernel 6.6 Rc5 cpe:2.3:o:linux:linux_kernel:6.6:rc5
  Linux Kernel 6.6 Rc6 cpe:2.3:o:linux:linux_kernel:6.6:rc6

Configuration #2

    CPE23 From Up To
  Fedoraproject Fedora 39 cpe:2.3:o:fedoraproject:fedora:39
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...