First published: Fri Mar 14 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in some scenario, we expect the exp not to be removed when the created ct will not be confirmed, like in OVS and TC conntrack in the following patches. This patch allows exp not to be removed by setting IPS_CONFIRMED in the status of the tmpl.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | ||
debian/linux | <=5.10.223-1<=5.10.234-1<=6.1.129-1 | 6.1.135-1 6.12.25-1 6.12.27-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52927 is considered a high-severity vulnerability due to its potential impact on the Linux kernel's connection tracking functionality.
To fix CVE-2023-52927, upgrade your Linux kernel to the latest version that includes the security patch for this vulnerability.
CVE-2023-52927 could lead to unexpected behavior in packet filtering and connection tracking, potentially allowing unauthorized access.
CVE-2023-52927 affects multiple versions of the Linux kernel prior to the application of available patches.
As of now, there are no public exploits confirmed for CVE-2023-52927, but due diligence is advised.