๐Ÿ” CVE Alert

CVE-2023-4004

HIGH 7.8

Kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove()

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.

CWE CWE-416
Vendor red hat
Product red hat enterprise linux 8
Published Jul 31, 2023
Last Updated Nov 8, 2025
Stay Ahead of the Next One

Get instant alerts for red hat red hat enterprise linux 8

Be the first to know when new high vulnerabilities affecting red hat red hat enterprise linux 8 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Extended Update Support
All versions affected
Red Hat / Red Hat Virtualization 4 for Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2023:4961 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:4962 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:4967 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:5069 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:5091 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:5093 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:5221 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:5244 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:5255 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:5548 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:5627 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7382 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7389 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7411 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7417 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7431 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:7434 access.redhat.com: https://access.redhat.com/security/cve/CVE-2023-4004 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2225275 patchwork.ozlabs.org: https://patchwork.ozlabs.org/project/netfilter-devel/patch/[email protected]/ packetstormsecurity.com: http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html packetstormsecurity.com: http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html security.netapp.com: https://security.netapp.com/advisory/ntap-20231027-0001/ debian.org: https://www.debian.org/security/2023/dsa-5480 debian.org: https://www.debian.org/security/2023/dsa-5492