CVE-2023-53304 (GCVE-0-2023-53304)
Vulnerability from cvelistv5
Published
2025-09-16 16:11
Modified
2025-09-16 16:11
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_rbtree: fix overlap expiration walk
The lazy gc on insert that should remove timed-out entries fails to release
the other half of the interval, if any.
Can be reproduced with tests/shell/testcases/sets/0044interval_overlap_0
in nftables.git and kmemleak enabled kernel.
Second bug is the use of rbe_prev vs. prev pointer.
If rbe_prev() returns NULL after at least one iteration, rbe_prev points
to element that is not an end interval, hence it should not be removed.
Lastly, check the genmask of the end interval if this is active in the
current generation.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Linux | Linux |
Version: 7ab87a326f20c52ff4d9972052d085be951c704b Version: 181859bdfb9734aca449512fccaee4cacce64aed Version: 4aacf3d78424293e318c616016865380b37b9cc5 Version: 2bf1435fa19d2c58054391b3bba40d5510a5758c Version: 318cb24a4c3fce8140afaf84e4d45fcb76fb280b Version: c9e6978e2725a7d4b6cd23b2facd3f11422c0643 Version: c9e6978e2725a7d4b6cd23b2facd3f11422c0643 |
||||||
|
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "net/netfilter/nft_set_rbtree.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "8284a79136c384059e85e278da2210b809730287", "status": "affected", "version": "7ab87a326f20c52ff4d9972052d085be951c704b", "versionType": "git" }, { "lessThan": "acaee227cf79c45a5d2d49c3e9a66333a462802c", "status": "affected", "version": "181859bdfb9734aca449512fccaee4cacce64aed", "versionType": "git" }, { "lessThan": "893cb3c3513cf661a0ff45fe0cfa83fe27131f76", "status": "affected", "version": "4aacf3d78424293e318c616016865380b37b9cc5", "versionType": "git" }, { "lessThan": "50cbb9d195c197af671869c8cadce3bd483735a0", "status": "affected", "version": "2bf1435fa19d2c58054391b3bba40d5510a5758c", "versionType": "git" }, { "lessThan": "89a4d1a89751a0fbd520e64091873e19cc0979e8", "status": "affected", "version": "318cb24a4c3fce8140afaf84e4d45fcb76fb280b", "versionType": "git" }, { "lessThan": "cd66733932399475fe933cb3ec03e687ed401462", "status": "affected", "version": "c9e6978e2725a7d4b6cd23b2facd3f11422c0643", "versionType": "git" }, { "lessThan": "f718863aca469a109895cb855e6b81fff4827d71", "status": "affected", "version": "c9e6978e2725a7d4b6cd23b2facd3f11422c0643", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "net/netfilter/nft_set_rbtree.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.2" }, { "lessThan": "6.2", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.190", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.124", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.43", "versionType": "semver" }, { "lessThanOrEqual": "6.4.*", "status": "unaffected", "version": "6.4.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.5", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.10.190", "versionStartIncluding": "5.10.166", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.15.124", "versionStartIncluding": "5.15.91", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.43", "versionStartIncluding": "6.1.9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.4.8", "versionStartIncluding": "6.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.5", "versionStartIncluding": "6.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_rbtree: fix overlap expiration walk\n\nThe lazy gc on insert that should remove timed-out entries fails to release\nthe other half of the interval, if any.\n\nCan be reproduced with tests/shell/testcases/sets/0044interval_overlap_0\nin nftables.git and kmemleak enabled kernel.\n\nSecond bug is the use of rbe_prev vs. prev pointer.\nIf rbe_prev() returns NULL after at least one iteration, rbe_prev points\nto element that is not an end interval, hence it should not be removed.\n\nLastly, check the genmask of the end interval if this is active in the\ncurrent generation." } ], "providerMetadata": { "dateUpdated": "2025-09-16T16:11:44.147Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/8284a79136c384059e85e278da2210b809730287" }, { "url": "https://git.kernel.org/stable/c/acaee227cf79c45a5d2d49c3e9a66333a462802c" }, { "url": "https://git.kernel.org/stable/c/893cb3c3513cf661a0ff45fe0cfa83fe27131f76" }, { "url": "https://git.kernel.org/stable/c/50cbb9d195c197af671869c8cadce3bd483735a0" }, { "url": "https://git.kernel.org/stable/c/89a4d1a89751a0fbd520e64091873e19cc0979e8" }, { "url": "https://git.kernel.org/stable/c/cd66733932399475fe933cb3ec03e687ed401462" }, { "url": "https://git.kernel.org/stable/c/f718863aca469a109895cb855e6b81fff4827d71" } ], "title": "netfilter: nft_set_rbtree: fix overlap expiration walk", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2023-53304", "datePublished": "2025-09-16T16:11:44.147Z", "dateReserved": "2025-09-16T08:09:37.994Z", "dateUpdated": "2025-09-16T16:11:44.147Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-53304\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-09-16T17:15:35.240\",\"lastModified\":\"2025-09-17T14:18:55.093\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: nft_set_rbtree: fix overlap expiration walk\\n\\nThe lazy gc on insert that should remove timed-out entries fails to release\\nthe other half of the interval, if any.\\n\\nCan be reproduced with tests/shell/testcases/sets/0044interval_overlap_0\\nin nftables.git and kmemleak enabled kernel.\\n\\nSecond bug is the use of rbe_prev vs. prev pointer.\\nIf rbe_prev() returns NULL after at least one iteration, rbe_prev points\\nto element that is not an end interval, hence it should not be removed.\\n\\nLastly, check the genmask of the end interval if this is active in the\\ncurrent generation.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/50cbb9d195c197af671869c8cadce3bd483735a0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8284a79136c384059e85e278da2210b809730287\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/893cb3c3513cf661a0ff45fe0cfa83fe27131f76\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/89a4d1a89751a0fbd520e64091873e19cc0979e8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/acaee227cf79c45a5d2d49c3e9a66333a462802c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cd66733932399475fe933cb3ec03e687ed401462\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f718863aca469a109895cb855e6b81fff4827d71\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…