Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
This flaw can be mitigated by preventing the affected netfilter kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3623-1 | linux-5.10 security update |
Debian DSA |
DSA-5480-1 | linux security update |
Debian DSA |
DSA-5492-1 | linux security update |
EUVD |
EUVD-2023-53899 | A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system. |
Ubuntu USN |
USN-6315-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6316-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6318-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6321-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6325-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6328-1 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6330-1 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-6332-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6348-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6385-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6442-1 | Linux kernel (BlueField) vulnerabilities |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 22 Nov 2024 12:00:00 +0000
Fri, 13 Sep 2024 19:45:00 +0000
Subscriptions
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-08T03:13:35.436Z
Reserved: 2023-07-30T11:58:17.241Z
Link: CVE-2023-4004
No data.
Status : Modified
Published: 2023-07-31T17:15:10.203
Modified: 2024-11-21T08:34:12.390
Link: CVE-2023-4004
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN