In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: fix memleak when more than 255 elements expired
When more than 255 elements expired we're supposed to switch to a new gc
container structure.
This never happens: u8 type will wrap before reaching the boundary
and nft_trans_gc_space() always returns true.
This means we recycle the initial gc container structure and
lose track of the elements that came before.
While at it, don't deref 'gc' after we've passed it to call_rcu.
References
Configurations
Configuration 1 (hide)
|
History
04 Apr 2025, 14:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
CWE | CWE-401 | |
References | () https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8 - Patch | |
References | () https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14 - Patch | |
References | () https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125 - Patch | |
References | () https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07 - Patch | |
References | () https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01 - Patch | |
References | () https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5 - Patch | |
References | () https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171 - Patch | |
First Time |
Linux
Linux linux Kernel |
Information
Published : 2024-03-02 22:15
Updated : 2025-04-04 14:46
NVD link : CVE-2023-52581
Mitre link : CVE-2023-52581
CVE.ORG link : CVE-2023-52581
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime