-
CVE-2023-53566
- EPSS 0.02%
- Published 04.10.2025 15:17:08
- Last modified 06.10.2025 14:56:21
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: fix null deref on element insertion There is no guarantee that rb_prev() will not return NULL in nft_rbtree_gc_elem(): general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] nft_add_set_elem+0x14b0/0x2990 nf_tables_newsetelem+0x528/0xb30 Furthermore, there is a possible use-after-free while iterating, 'node' can be free'd so we need to cache the next value to use.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
b76db53ee8802ee5683f8cb401d7e2ec6f9b3d56
Version
7ab87a326f20c52ff4d9972052d085be951c704b
Status
affected
Version <
899aa5638568abf5d69de7a7bb95e4615157375b
Version
181859bdfb9734aca449512fccaee4cacce64aed
Status
affected
Version <
3fa13203b6d90cc3a33af47b058739f92ab82eef
Version
4aacf3d78424293e318c616016865380b37b9cc5
Status
affected
Version <
ec5caa765f7f6960011c919c9aeb1467940421f6
Version
2bf1435fa19d2c58054391b3bba40d5510a5758c
Status
affected
Version <
a836be60a3aabcedcd9c79f545d409ace1f20ba6
Version
318cb24a4c3fce8140afaf84e4d45fcb76fb280b
Status
affected
Version <
a337706c1fb35aac3f26b48aca80421bdbe1d33a
Version
c9e6978e2725a7d4b6cd23b2facd3f11422c0643
Status
affected
Version <
61ae320a29b0540c16931816299eb86bf2b66c08
Version
c9e6978e2725a7d4b6cd23b2facd3f11422c0643
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.2
Status
affected
Version <
6.2
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.181
Status
unaffected
Version <=
5.15.*
Version
5.15.113
Status
unaffected
Version <=
6.1.*
Version
6.1.30
Status
unaffected
Version <=
6.3.*
Version
6.3.4
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.053 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|