{"id":"CVE-2023-31248","details":"Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace","modified":"2026-04-16T04:38:26.209752944Z","published":"2023-07-05T19:15:09.713Z","related":["ALSA-2023:5069","ALSA-2023:5091","SUSE-SU-2023:3171-1","SUSE-SU-2023:3172-1","SUSE-SU-2023:3180-1","SUSE-SU-2023:3182-1","SUSE-SU-2023:3302-1","SUSE-SU-2023:3318-1","SUSE-SU-2023:3391-1","SUSE-SU-2023:3421-1","SUSE-SU-2023:3772-1","SUSE-SU-2023:3773-1","SUSE-SU-2023:3783-1","SUSE-SU-2023:3784-1","SUSE-SU-2023:3892-1","SUSE-SU-2023:3922-1","SUSE-SU-2023:3923-1","SUSE-SU-2023:3928-1","SUSE-SU-2025:03600-1","SUSE-SU-2025:03613-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03626-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:3761-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1"],"references":[{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5453"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2023/07/05/2"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240201-0001/"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"},{"type":"FIX","url":"https://lore.kernel.org/netfilter-devel/20230705121627.GC19489@breakpoint.cc/T/"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/07/05/2"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.9"},{"fixed":"5.10.188"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.121"}]},{"events":[{"introduced":"5.16"},{"fixed":"6.1.39"}]},{"events":[{"introduced":"6.2"},{"fixed":"6.4.4"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"last_affected":"22.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-31248.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}