CVE-2023-4004 - Use After Free

Severity

78%

Complexity

18%

Confidentiality

98%

A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.

CVSS 3.1 Base Score 7.8. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Demo Examples

Use After Free

CWE-416

The following example demonstrates the weakness.


               
}
free(buf3R2);

Use After Free

CWE-416

The following code illustrates a use after free error:


               
}
free(ptr);
logError("operation aborted before commit", ptr);

When an error occurs, the pointer is immediately freed. However, this pointer is later incorrectly used in the logError function.

Overview

Type

Linux

First reported 1 year ago

2023-07-31 17:15:00

Last updated 1 year ago

2023-12-29 15:41:00

Affected Software

Linux Kernel

Red Hat Enterprise Linux 8.0

8.0

References

https://bugzilla.redhat.com/show_bug.cgi?id=2225275

https://access.redhat.com/security/cve/CVE-2023-4004

https://patchwork.ozlabs.org/project/netfilter-devel/patch/[email protected]/

https://bugzilla.redhat.com/show_bug.cgi?id=2225275

Issue Tracking, Third Party Advisory

https://access.redhat.com/security/cve/CVE-2023-4004

Third Party Advisory

https://patchwork.ozlabs.org/project/netfilter-devel/patch/[email protected]/

Mailing List, Patch, Third Party Advisory

https://www.debian.org/security/2023/dsa-5480

https://access.redhat.com/errata/RHSA-2023:4962

https://access.redhat.com/errata/RHSA-2023:4961

https://access.redhat.com/errata/RHSA-2023:4967

https://www.debian.org/security/2023/dsa-5492

https://access.redhat.com/errata/RHSA-2023:5091

https://access.redhat.com/errata/RHSA-2023:5069

https://access.redhat.com/errata/RHSA-2023:5093

https://access.redhat.com/errata/RHSA-2023:5221

https://access.redhat.com/errata/RHSA-2023:5244

https://access.redhat.com/errata/RHSA-2023:5255

https://access.redhat.com/errata/RHSA-2023:5548

https://access.redhat.com/errata/RHSA-2023:5627

http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html

https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html

https://security.netapp.com/advisory/ntap-20231027-0001/

RHSA-2023:7382

RHSA-2023:7389

RHSA-2023:7411

RHSA-2023:7417

RHSA-2023:7431

RHSA-2023:7434

http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html

https://www.debian.org/security/2023/dsa-5480

Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:4962

Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:4961

Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:4967

Third Party Advisory

https://www.debian.org/security/2023/dsa-5492

Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:5091

Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:5069

Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:5093

Broken Link, Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:5221

Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:5244

Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:5255

Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:5548

Third Party Advisory

https://access.redhat.com/errata/RHSA-2023:5627

Third Party Advisory

http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html

Third Party Advisory, VDB Entry

https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html

Third Party Advisory

https://security.netapp.com/advisory/ntap-20231027-0001/

Third Party Advisory

RHSA-2023:7382

Third Party Advisory

RHSA-2023:7389

Third Party Advisory

RHSA-2023:7411

Third Party Advisory, VDB Entry

RHSA-2023:7417

Third Party Advisory, VDB Entry

RHSA-2023:7431

Third Party Advisory, VDB Entry

RHSA-2023:7434

Third Party Advisory, VDB Entry

http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html

Third Party Advisory, VDB Entry

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.