First published: Mon Jan 20 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: adapt set backend to use GC transaction API Use the GC transaction API to replace the old and buggy gc API and the busy mark approach. No set elements are removed from async garbage collection anymore, instead the _DEAD bit is set on so the set element is not visible from lookup path anymore. Async GC enqueues transaction work that might be aborted and retried later. rbtree and pipapo set backends does not set on the _DEAD bit from the sync GC path since this runs in control plane path where mutex is held. In this case, set elements are deactivated, removed and then released via RCU callback, sync GC never fails.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-52923 is categorized as low, focusing on enhancing the garbage collection within the Linux kernel.
To fix CVE-2023-52923, update your Linux kernel to the latest stable version that includes the patch for this vulnerability.
CVE-2023-52923 affects various releases of the Linux kernel where the netfilter component is utilized.
CVE-2023-52923 is a vulnerability related to improvements in the garbage collection mechanism of netfilter in the Linux kernel.
CVE-2023-52923 is not an exploit but rather a resolved vulnerability aimed at improving the stability of the netfilter component in the kernel.