A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| linux | linux_kernel | 3.16 - 4.14.322 | - |
| linux | linux_kernel | 4.15 - 4.19.291 | - |
| linux | linux_kernel | 4.20 - 5.4.251 |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
12
Affected Products
16
References
linux / linux_kernel
| - |
| linux | linux_kernel | 5.5 - 5.10.188 | - |
| linux | linux_kernel | 5.11 - 5.15.118 | - |
| linux | linux_kernel | 5.16 - 6.1.35 | - |
| linux | linux_kernel | 6.2 - 6.3.9 | - |
| netapp | h300s | - | - |
| netapp | h410c | - | - |
| netapp | h410s | - | - |
| netapp | h500s | - | - |
| netapp | h700s | - | - |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact