CVE-2023-52923

Source
https://cve.org/CVERecord?id=CVE-2023-52923
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52923.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52923
Downstream
Related
Published
2025-01-20T10:48:13.723Z
Modified
2026-03-20T12:32:53.208585Z
Summary
netfilter: nf_tables: adapt set backend to use GC transaction API
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: adapt set backend to use GC transaction API

Use the GC transaction API to replace the old and buggy gc API and the busy mark approach.

No set elements are removed from async garbage collection anymore, instead the _DEAD bit is set on so the set element is not visible from lookup path anymore. Async GC enqueues transaction work that might be aborted and retried later.

rbtree and pipapo set backends does not set on the _DEAD bit from the sync GC path since this runs in control plane path where mutex is held. In this case, set elements are deactivated, removed and then released via RCU callback, sync GC never fails.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52923.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9d0982927e79049675cb6c6c04a0ebb3dad5a434
Fixed
cb4d00b563675ba8ff6ef94b077f58d816f68ba3
Fixed
c357648929c8dff891502349769aafb8f0452bc2
Fixed
146c76866795553dbc19998f36718d7986ad302b
Fixed
479a2cf5259347d6a1f658b0f791d27a34908e91
Fixed
df650d6a4bf47248261b61ef6b174d7c54034d15
Fixed
e4d71d6a9c7db93f7bf20c3a0f0659d63d7de681
Fixed
f6c383b8c31a93752a52697f8430a71dcbc46adf

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52923.json"