First published: Tue Feb 20 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction New elements in this transaction might expired before such transaction ends. Skip sync GC for such elements otherwise commit path might walk over an already released object. Once transaction is finished, async GC will collect such expired element.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | >=6.5<6.5.4 | |
NetApp ONTAP Tools for VMware vSphere | =9 | |
NetApp ONTAP Tools for VMware vSphere | =10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52433 is classified as a high severity vulnerability due to its potential impact on system stability and security.
To fix CVE-2023-52433, you should update your Linux kernel to the latest patched version provided by your distribution.
CVE-2023-52433 affects certain versions of the Linux kernel, particularly those using netfilter functionalities.
The risks associated with CVE-2023-52433 include potential instability and unexpected behaviors in network packet filtering.
As of the latest information, there are no confirmed reports of CVE-2023-52433 being actively exploited in the wild.