5.5
CVE-2023-52923
- EPSS 0.06%
- Published 20.01.2025 11:15:07
- Last modified 15.10.2025 20:03:44
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Open
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: adapt set backend to use GC transaction API Use the GC transaction API to replace the old and buggy gc API and the busy mark approach. No set elements are removed from async garbage collection anymore, instead the _DEAD bit is set on so the set element is not visible from lookup path anymore. Async GC enqueues transaction work that might be aborted and retried later. rbtree and pipapo set backends does not set on the _DEAD bit from the sync GC path since this runs in control plane path where mutex is held. In this case, set elements are deactivated, removed and then released via RCU callback, sync GC never fails.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 4.1 < 4.19.316
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.262
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.198
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.134
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.56
Linux ≫ Linux Kernel Version >= 6.2 < 6.4.11
Linux ≫ Linux Kernel Version6.5 Updaterc1
Linux ≫ Linux Kernel Version6.5 Updaterc2
Linux ≫ Linux Kernel Version6.5 Updaterc3
Linux ≫ Linux Kernel Version6.5 Updaterc4
Linux ≫ Linux Kernel Version6.5 Updaterc5
| Type | Source | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.173 |
| Source | Base Score | Exploit Score | Impact Score | Vector string |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|