CVE-2023-53304

high

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_rbtree: fix overlap expiration walk The lazy gc on insert that should remove timed-out entries fails to release the other half of the interval, if any. Can be reproduced with tests/shell/testcases/sets/0044interval_overlap_0 in nftables.git and kmemleak enabled kernel. Second bug is the use of rbe_prev vs. prev pointer. If rbe_prev() returns NULL after at least one iteration, rbe_prev points to element that is not an end interval, hence it should not be removed. Lastly, check the genmask of the end interval if this is active in the current generation.

References

https://git.kernel.org/stable/c/f718863aca469a109895cb855e6b81fff4827d71

https://git.kernel.org/stable/c/cd66733932399475fe933cb3ec03e687ed401462

https://git.kernel.org/stable/c/acaee227cf79c45a5d2d49c3e9a66333a462802c

https://git.kernel.org/stable/c/89a4d1a89751a0fbd520e64091873e19cc0979e8

https://git.kernel.org/stable/c/893cb3c3513cf661a0ff45fe0cfa83fe27131f76

https://git.kernel.org/stable/c/8284a79136c384059e85e278da2210b809730287

https://git.kernel.org/stable/c/50cbb9d195c197af671869c8cadce3bd483735a0

Details

Source: Mitre, NVD

Published: 2025-09-16

Updated: 2025-09-17

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Severity: High

EPSS

EPSS: 0.00024