{"id":"CVE-2023-35001","details":"Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace","modified":"2026-03-15T22:44:38.283600Z","published":"2023-07-05T19:15:10.147Z","related":["ALSA-2023:5069","ALSA-2023:5091","ALSA-2023:5244","MGASA-2023-0237","MGASA-2023-0243","SUSE-SU-2023:3006-1","SUSE-SU-2023:3171-1","SUSE-SU-2023:3172-1","SUSE-SU-2023:3180-1","SUSE-SU-2023:3182-1","SUSE-SU-2023:3302-1","SUSE-SU-2023:3309-1","SUSE-SU-2023:3318-1","SUSE-SU-2023:3324-1","SUSE-SU-2023:3349-1","SUSE-SU-2023:3390-1","SUSE-SU-2023:3391-1","SUSE-SU-2023:3392-1","SUSE-SU-2023:3421-1","SUSE-SU-2023:3566-1","SUSE-SU-2023:3571-1","SUSE-SU-2023:3572-1","SUSE-SU-2023:3576-1","SUSE-SU-2023:3582-1","SUSE-SU-2023:3585-1","SUSE-SU-2023:3592-1","SUSE-SU-2023:3594-1","SUSE-SU-2023:3595-1","SUSE-SU-2023:3596-1","SUSE-SU-2023:3598-1","SUSE-SU-2023:3603-1","SUSE-SU-2023:3607-1","SUSE-SU-2023:3612-1","SUSE-SU-2023:3620-1","SUSE-SU-2023:3621-1","SUSE-SU-2023:3622-1","SUSE-SU-2023:3623-1","SUSE-SU-2023:3627-1","SUSE-SU-2023:3628-1","SUSE-SU-2023:3629-1","SUSE-SU-2023:3630-1","SUSE-SU-2023:3631-1","SUSE-SU-2023:3632-1","SUSE-SU-2023:3644-1","SUSE-SU-2023:3647-1","SUSE-SU-2023:3648-1","SUSE-SU-2023:3653-1","SUSE-SU-2023:3657-1","SUSE-SU-2023:3659-1","SUSE-SU-2023:3668-1","SUSE-SU-2023:3671-1","SUSE-SU-2023:3675-1","SUSE-SU-2023:3676-1","SUSE-SU-2023:3677-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230824-0007/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2023/07/05/3"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5453"},{"type":"FIX","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html"},{"type":"FIX","url":"https://lore.kernel.org/netfilter-devel/20230705121515.747251-1-cascardo@canonical.com/T/"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/07/05/3"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-35001.json","unresolved_ranges":[{"events":[{"introduced":"3.13"},{"fixed":"4.14.322"}]},{"events":[{"introduced":"4.15"},{"last_affected":"4.19.291"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.251"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.188"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.121"}]},{"events":[{"introduced":"5.16"},{"fixed":"6.1.39"}]},{"events":[{"introduced":"6.2"},{"fixed":"6.4.4"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}