CVE-2023-52923

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/01/2025
Last modified:
15/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_tables: adapt set backend to use GC transaction API<br /> <br /> Use the GC transaction API to replace the old and buggy gc API and the<br /> busy mark approach.<br /> <br /> No set elements are removed from async garbage collection anymore,<br /> instead the _DEAD bit is set on so the set element is not visible from<br /> lookup path anymore. Async GC enqueues transaction work that might be<br /> aborted and retried later.<br /> <br /> rbtree and pipapo set backends does not set on the _DEAD bit from the<br /> sync GC path since this runs in control plane path where mutex is held.<br /> In this case, set elements are deactivated, removed and then released<br /> via RCU callback, sync GC never fails.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.1 (including) 4.19.316 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.262 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.198 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.134 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.56 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.4.11 (excluding)
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:*