In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: adapt set backend to use GC transaction API Use the GC transaction API to replace the old and buggy gc API and the busy mark approach. No set elements are removed from async garbage collection anymore, instead the _DEAD bit is set on so the set element is not visible from lookup path anymore. Async GC enqueues transaction work that might be aborted and retried later. rbtree and pipapo set backends does not set on the _DEAD bit from the sync GC path since this runs in control plane path where mutex is held. In this case, set elements are deactivated, removed and then released via RCU callback, sync GC never fails.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00116}

epss

{'score': 0.00089}


Tue, 08 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-99

Tue, 21 Jan 2025 02:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Mon, 20 Jan 2025 11:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: adapt set backend to use GC transaction API Use the GC transaction API to replace the old and buggy gc API and the busy mark approach. No set elements are removed from async garbage collection anymore, instead the _DEAD bit is set on so the set element is not visible from lookup path anymore. Async GC enqueues transaction work that might be aborted and retried later. rbtree and pipapo set backends does not set on the _DEAD bit from the sync GC path since this runs in control plane path where mutex is held. In this case, set elements are deactivated, removed and then released via RCU callback, sync GC never fails.
Title netfilter: nf_tables: adapt set backend to use GC transaction API
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2025-01-20T10:48:13.723Z

Updated: 2025-05-04T07:46:05.066Z

Reserved: 2024-08-21T06:07:11.018Z

Link: CVE-2023-52923

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-01-20T11:15:07.670

Modified: 2025-01-20T11:15:07.670

Link: CVE-2023-52923

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-01-20T00:00:00Z

Links: CVE-2023-52923 - Bugzilla