CVE-2023-52581

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix memleak when more than 255 elements expired When more than 255 elements expired we're supposed to switch to a new gc container structure. This never happens: u8 type will wrap before reaching the boundary and nft_trans_gc_space() always returns true. This means we recycle the initial gc container structure and lose track of the elements that came before. While at it, don't deref 'gc' after we've passed it to call_rcu.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*

History

04 Apr 2025, 14:46

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8 - () https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8 - Patch
References () https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14 - () https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14 - Patch
References () https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125 - () https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125 - Patch
References () https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07 - () https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07 - Patch
References () https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01 - () https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01 - Patch
References () https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5 - () https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5 - Patch
References () https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171 - () https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171 - Patch
CWE CWE-401

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8 - () https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8 -
References () https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14 - () https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14 -
References () https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125 - () https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125 -
References () https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07 - () https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07 -
References () https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01 - () https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01 -
References () https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5 - () https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5 -
References () https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171 - () https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171 -

07 Nov 2024, 15:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.3

16 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125 -

04 Apr 2024, 14:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_tables: corrige memleak cuando caducan más de 255 elementos Cuando caducan más de 255 elementos, se supone que debemos cambiar a una nueva estructura de contenedor gc. Esto nunca sucede: el tipo u8 se ajustará antes de alcanzar el límite y nft_trans_gc_space() siempre devuelve verdadero. Esto significa que reciclamos la estructura inicial del contenedor gc y perdemos la pista de los elementos anteriores. Mientras lo hace, no elimine 'gc' después de que lo hayamos pasado a call_rcu.
References
  • () https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8 -
  • () https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07 -
  • () https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01 -
  • () https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171 -

02 Mar 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-02 22:15

Updated : 2025-04-04 14:46


NVD link : CVE-2023-52581

Mitre link : CVE-2023-52581

CVE.ORG link : CVE-2023-52581


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime