CVE-2023-53304

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: fix overlap expiration walk The lazy gc on insert that should remove timed-out entries fails to release the other half of the interval, if any. Can be reproduced with tests/shell/testcases/sets/0044interval_overlap_0 in nftables.git and kmemleak enabled kernel. Second bug is the use of rbe_prev vs. prev pointer. If rbe_prev() returns NULL after at least one iteration, rbe_prev points to element that is not an end interval, hence it should not be removed. Lastly, check the genmask of the end interval if this is active in the current generation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*

History

01 Dec 2025, 21:58

Type Values Removed Values Added
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/50cbb9d195c197af671869c8cadce3bd483735a0 - () https://git.kernel.org/stable/c/50cbb9d195c197af671869c8cadce3bd483735a0 - Patch
References () https://git.kernel.org/stable/c/8284a79136c384059e85e278da2210b809730287 - () https://git.kernel.org/stable/c/8284a79136c384059e85e278da2210b809730287 - Patch
References () https://git.kernel.org/stable/c/893cb3c3513cf661a0ff45fe0cfa83fe27131f76 - () https://git.kernel.org/stable/c/893cb3c3513cf661a0ff45fe0cfa83fe27131f76 - Patch
References () https://git.kernel.org/stable/c/89a4d1a89751a0fbd520e64091873e19cc0979e8 - () https://git.kernel.org/stable/c/89a4d1a89751a0fbd520e64091873e19cc0979e8 - Patch
References () https://git.kernel.org/stable/c/acaee227cf79c45a5d2d49c3e9a66333a462802c - () https://git.kernel.org/stable/c/acaee227cf79c45a5d2d49c3e9a66333a462802c - Patch
References () https://git.kernel.org/stable/c/cd66733932399475fe933cb3ec03e687ed401462 - () https://git.kernel.org/stable/c/cd66733932399475fe933cb3ec03e687ed401462 - Patch
References () https://git.kernel.org/stable/c/f718863aca469a109895cb855e6b81fff4827d71 - () https://git.kernel.org/stable/c/f718863aca469a109895cb855e6b81fff4827d71 - Patch
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:-:*:*:*:*:*:*

Information

Published : 2025-09-16 17:15

Updated : 2025-12-01 21:58


NVD link : CVE-2023-53304

Mitre link : CVE-2023-53304

CVE.ORG link : CVE-2023-53304


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference