Lucene search

K
redhatcveRedhat.comRH:CVE-2023-4563
HistoryAug 28, 2023 - 7:15 p.m.

CVE-2023-4563

2023-08-2819:15:28
redhat.com
access.redhat.com
23
use-after-free
nftables
local attacker
system crash
kernel information leak
mitigation
blacklist mechanism

0.0004 Low

EPSS

Percentile

5.1%

A use-after-free flaw was found in the nftables sub-component due to a race problem between the set GC and transaction in the Linux Kernel. This flaw allows a local attacker to crash the system due to a missing call to nft_set_elem_mark_busy, causing double deactivation of the element and possibly leading to a kernel information leak problem.

Mitigation

Mitigation for this issue is to skip loading the affected module "nftables" onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.

How do I blacklist a kernel module to prevent it from loading automatically?  
https://access.redhat.com/solutions/41278