{"id":"CVE-2023-4015","summary":"Use-after-free in Linux kernel's netfilter: nf_tables component","details":"A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nOn an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() can lead unbinding the chain and objects be deactivated but later used.\n\nWe recommend upgrading past commit 0a771f7b266b02d262900c75f1e175c7fe76fec2.","modified":"2026-05-15T11:53:21.134646565Z","published":"2023-09-06T13:52:44.724Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/4xxx/CVE-2023-4015.json","cna_assigner":"Google","cwe_ids":["CWE-416"]},"references":[{"type":"WEB","url":"https://git.kernel.org"},{"type":"WEB","url":"https://kernel.dance/0a771f7b266b02d262900c75f1e175c7fe76fec2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/4xxx/CVE-2023-4015.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4015"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5492"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0a771f7b266b02d262900c75f1e175c7fe76fec2"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}