A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.
https://patchwork.ozlabs.org/project/netfilter-devel/patch/[email protected]/
https://bugzilla.redhat.com/show_bug.cgi?id=2225275
https://access.redhat.com/security/cve/CVE-2023-4004
https://access.redhat.com/errata/RHSA-2023:7434
https://access.redhat.com/errata/RHSA-2023:7431
https://access.redhat.com/errata/RHSA-2023:7417
https://access.redhat.com/errata/RHSA-2023:7411
https://access.redhat.com/errata/RHSA-2023:7389
https://access.redhat.com/errata/RHSA-2023:7382
https://access.redhat.com/errata/RHSA-2023:5627
https://access.redhat.com/errata/RHSA-2023:5548
https://access.redhat.com/errata/RHSA-2023:5255
https://access.redhat.com/errata/RHSA-2023:5244
https://access.redhat.com/errata/RHSA-2023:5221
https://access.redhat.com/errata/RHSA-2023:5093
https://access.redhat.com/errata/RHSA-2023:5091
https://access.redhat.com/errata/RHSA-2023:5069
https://access.redhat.com/errata/RHSA-2023:4967