CVE-2023-52433

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction New elements in this transaction might expired before such transaction ends. Skip sync GC for such elements otherwise commit path might walk over an already released object. Once transaction is finished, async GC will collect such expired element.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*

History

25 Mar 2025, 16:14

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017 - () https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017 - Patch
References () https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4 - () https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4 - Patch
References () https://git.kernel.org/stable/c/9a8c544158f68f656d1734eb5ba00c4f817b76b1 - () https://git.kernel.org/stable/c/9a8c544158f68f656d1734eb5ba00c4f817b76b1 - Patch
References () https://git.kernel.org/stable/c/9af7dfb3c9d7985172a240f85e684c5cd33e29ce - () https://git.kernel.org/stable/c/9af7dfb3c9d7985172a240f85e684c5cd33e29ce - Patch
References () https://git.kernel.org/stable/c/9db9feb841f7449772f9393c16b9ef4536d8c127 - () https://git.kernel.org/stable/c/9db9feb841f7449772f9393c16b9ef4536d8c127 - Patch
References () https://git.kernel.org/stable/c/c323ed65f66e5387ee0a73452118d49f1dae81b8 - () https://git.kernel.org/stable/c/c323ed65f66e5387ee0a73452118d49f1dae81b8 - Patch
References () https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a - () https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a - Patch
References () https://security.netapp.com/advisory/ntap-20240828-0003/ - () https://security.netapp.com/advisory/ntap-20240828-0003/ - Third Party Advisory
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
First Time Netapp
Linux
Linux linux Kernel
Netapp ontap Tools

21 Nov 2024, 08:39

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240828-0003/ -
References () https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017 - () https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017 -
References () https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4 - () https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4 -
References () https://git.kernel.org/stable/c/9a8c544158f68f656d1734eb5ba00c4f817b76b1 - () https://git.kernel.org/stable/c/9a8c544158f68f656d1734eb5ba00c4f817b76b1 -
References () https://git.kernel.org/stable/c/9af7dfb3c9d7985172a240f85e684c5cd33e29ce - () https://git.kernel.org/stable/c/9af7dfb3c9d7985172a240f85e684c5cd33e29ce -
References () https://git.kernel.org/stable/c/9db9feb841f7449772f9393c16b9ef4536d8c127 - () https://git.kernel.org/stable/c/9db9feb841f7449772f9393c16b9ef4536d8c127 -
References () https://git.kernel.org/stable/c/c323ed65f66e5387ee0a73452118d49f1dae81b8 - () https://git.kernel.org/stable/c/c323ed65f66e5387ee0a73452118d49f1dae81b8 -
References () https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a - () https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a -

06 Nov 2024, 22:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.4
CWE CWE-273

16 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/9db9feb841f7449772f9393c16b9ef4536d8c127 -

04 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017 -
  • () https://git.kernel.org/stable/c/9a8c544158f68f656d1734eb5ba00c4f817b76b1 -
  • () https://git.kernel.org/stable/c/9af7dfb3c9d7985172a240f85e684c5cd33e29ce -
  • () https://git.kernel.org/stable/c/c323ed65f66e5387ee0a73452118d49f1dae81b8 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: netfilter: nft_set_rbtree: omitir sincronización GC para nuevos elementos en esta transacción los nuevos elementos en esta transacción pueden caducar antes de que finalice dicha transacción. Omita la sincronización del GC para dichos elementos; de lo contrario, la ruta de confirmación podría pasar por encima de un objeto ya liberado. Una vez finalizada la transacción, async GC recopilará dicho elemento caducado.

20 Feb 2024, 18:15

Type Values Removed Values Added
Summary (en) netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction New elements in this transaction might expired before such transaction ends. Skip sync GC for such elements otherwise commit path might walk over an already released object. Once transaction is finished, async GC will collect such expired element. (en) In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction New elements in this transaction might expired before such transaction ends. Skip sync GC for such elements otherwise commit path might walk over an already released object. Once transaction is finished, async GC will collect such expired element.
References
  • {'url': 'https://git.kernel.org/stable/c/2ee52ae94baa', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/e3213ff99a35', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • () https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4 -
  • () https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a -

20 Feb 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-20 13:15

Updated : 2025-03-25 16:14


NVD link : CVE-2023-52433

Mitre link : CVE-2023-52433

CVE.ORG link : CVE-2023-52433


JSON object : View

Products Affected

netapp

  • ontap_tools

linux

  • linux_kernel
CWE
CWE-273

Improper Check for Dropped Privileges