5.5
CVE-2023-53304
- EPSS 0.02%
- Veröffentlicht 16.09.2025 16:11:44
- Zuletzt bearbeitet 01.12.2025 21:58:59
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: fix overlap expiration walk The lazy gc on insert that should remove timed-out entries fails to release the other half of the interval, if any. Can be reproduced with tests/shell/testcases/sets/0044interval_overlap_0 in nftables.git and kmemleak enabled kernel. Second bug is the use of rbe_prev vs. prev pointer. If rbe_prev() returns NULL after at least one iteration, rbe_prev points to element that is not an end interval, hence it should not be removed. Lastly, check the genmask of the end interval if this is active in the current generation.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 5.10.166 < 5.10.190
Linux ≫ Linux Kernel Version >= 5.15.91 < 5.15.124
Linux ≫ Linux Kernel Version >= 6.1.9 < 6.1.43
Linux ≫ Linux Kernel Version >= 6.2.1 < 6.4.8
Linux ≫ Linux Kernel Version6.2 Update-
Linux ≫ Linux Kernel Version6.2 Updaterc6
Linux ≫ Linux Kernel Version6.2 Updaterc7
Linux ≫ Linux Kernel Version6.2 Updaterc8
Linux ≫ Linux Kernel Version6.5 Updaterc1
Linux ≫ Linux Kernel Version6.5 Updaterc2
Linux ≫ Linux Kernel Version6.5 Updaterc3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.035 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.