CVE-2023-53635

Source
https://cve.org/CVERecord?id=CVE-2023-53635
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53635.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53635
Downstream
Related
Published
2025-10-07T15:19:36.973Z
Modified
2026-03-20T12:33:16.212310Z
Summary
netfilter: conntrack: fix wrong ct->timeout value
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: fix wrong ct->timeout value

(struct nf_conn)->timeout is an interval before the conntrack confirmed. After confirmed, it becomes a timestamp.

It is observed that timeout of an unconfirmed conntrack: - Set by calling ctnetlinkchangetimeout(). As a result, nfct_time_stamp was wrongly added to ct->timeout twice. - Get by calling ctnetlinkdumptimeout(). As a result, nfct_time_stamp was wrongly subtracted.

Call Trace: <TASK> dumpstacklvl ctnetlinkdumptimeout __ctnetlinkgluebuild ctnetlinkgluebuild __nfqnlenqueuepacket nfqueue nfhookslow ipmc_output ? __pfxipfinishoutput ipsend_skb ? __pfxdstoutput udpsendskb udp_sendmsg ? __pfxipgenericgetfrag socksendmsg

Separate the 2 cases in: - Setting ct->timeout in _nfctsettimeout(). - Getting ct->timeout in ctnetlinkdumptimeout().

Pablo appends:

Update ctnetlink to set up the timeout after the IPS_CONFIRMED flag is set on, otherwise conntrack creation via ctnetlink breaks.

Note that the problem described in this patch occurs since the introduction of the nfnetlink_queue conntrack support, select a sufficiently old Fixes: tag for -stable kernel to pick up this fix.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53635.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a4b4766c3cebb4018167e06b863d8e95b7274757
Fixed
80c5ba0078e20d926d11d0778f9a43902664ebf0
Fixed
ff5e4ac8dd7be7f1faba955c5779a68571eeb0f8
Fixed
f612ae1ab4793701caf39386fb3b7f4b3ef44e48
Fixed
73db1b8f2bb6725b7391e85aab41fdf592b3c0c1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53635.json"