Executive Summary

Informations
Name CVE-2023-4244 First vendor Publication 2023-09-06
Vendor Cve Last vendor Modification 2025-02-13

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7
Base Score 7 Environmental Score 7
impact SubScore 5.9 Temporal Score 7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.

We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 1
Os 3613

Sources (Detail)

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id...
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
Date Informations
2025-03-29 03:26:02
  • Multiple Updates
2025-03-28 13:38:20
  • Multiple Updates
2025-03-28 03:06:46
  • Multiple Updates
2025-03-19 03:02:38
  • Multiple Updates
2025-03-18 03:15:02
  • Multiple Updates
2025-03-14 03:03:07
  • Multiple Updates
2025-02-21 21:21:09
  • Multiple Updates
2025-02-13 21:21:39
  • Multiple Updates
2025-01-08 02:56:16
  • Multiple Updates
2025-01-07 02:55:52
  • Multiple Updates
2024-12-25 02:54:38
  • Multiple Updates
2024-12-12 02:57:44
  • Multiple Updates
2024-11-28 14:29:15
  • Multiple Updates
2024-11-21 21:31:27
  • Multiple Updates
2024-11-20 02:52:01
  • Multiple Updates
2024-11-14 02:52:08
  • Multiple Updates
2024-11-09 02:52:27
  • Multiple Updates
2024-10-26 02:49:55
  • Multiple Updates
2024-10-25 02:51:48
  • Multiple Updates
2024-10-23 02:51:09
  • Multiple Updates
2024-10-03 02:46:51
  • Multiple Updates
2024-10-02 02:45:13
  • Multiple Updates
2024-09-15 02:43:21
  • Multiple Updates
2024-09-12 02:42:51
  • Multiple Updates
2024-09-04 02:44:26
  • Multiple Updates
2024-08-22 02:42:34
  • Multiple Updates
2024-08-02 13:51:27
  • Multiple Updates
2024-08-02 01:33:54
  • Multiple Updates
2024-03-12 13:40:23
  • Multiple Updates
2024-02-02 02:48:26
  • Multiple Updates
2024-02-01 12:31:00
  • Multiple Updates
2024-01-12 00:27:54
  • Multiple Updates
2023-12-29 02:37:24
  • Multiple Updates
2023-11-22 02:35:57
  • Multiple Updates
2023-10-29 09:27:46
  • Multiple Updates
2023-10-20 09:27:58
  • Multiple Updates
2023-10-11 02:31:47
  • Multiple Updates
2023-09-29 13:29:46
  • Multiple Updates
2023-09-12 00:27:42
  • Multiple Updates
2023-09-07 09:27:17
  • Multiple Updates
2023-09-06 21:27:19
  • First insertion