Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-52581", "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "state": "PUBLISHED", "assignerShortName": "Linux", "dateReserved": "2024-03-02T21:55:42.569Z", "datePublished": "2024-03-02T21:59:47.856Z", "dateUpdated": "2024-12-19T08:22:01.432Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux", "dateUpdated": "2024-12-19T08:22:01.432Z"}, "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix memleak when more than 255 elements expired\n\nWhen more than 255 elements expired we're supposed to switch to a new gc\ncontainer structure.\n\nThis never happens: u8 type will wrap before reaching the boundary\nand nft_trans_gc_space() always returns true.\n\nThis means we recycle the initial gc container structure and\nlose track of the elements that came before.\n\nWhile at it, don't deref 'gc' after we've passed it to call_rcu."}], "affected": [{"product": "Linux", "vendor": "Linux", "defaultStatus": "unaffected", "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "programFiles": ["include/net/netfilter/nf_tables.h", "net/netfilter/nf_tables_api.c"], "versions": [{"version": "8da1b048f9a501d3d7d38c188ba09d7d0d5b8c27", "lessThan": "7cf055b43756b10aa2b851c927c940f5ed652125", "status": "affected", "versionType": "git"}, {"version": "bbdb3b65aa91aa0a32b212f27780b28987f2d94f", "lessThan": "a995a68e8a3b48533e47c856865d109a1f1a9d01", "status": "affected", "versionType": "git"}, {"version": "448be0774882f95a74fa5eb7519761152add601b", "lessThan": "09c85f2d21ab6b5acba31a037985b13e8e6565b8", "status": "affected", "versionType": "git"}, {"version": "d19e8bf3ea4114dd21fc35da21f398203d7f7df1", "lessThan": "ef99506eaf1dc31feff1adfcfd68bc5535a22171", "status": "affected", "versionType": "git"}, {"version": "ea3eb9f2192e4fc33b795673e56c97a21987f868", "lessThan": "7e5d732e6902eb6a37b35480796838a145ae5f07", "status": "affected", "versionType": "git"}, {"version": "5f68718b34a531a556f2f50300ead2862278da26", "lessThan": "4aea243b6853d06c1d160a9955b759189aa02b14", "status": "affected", "versionType": "git"}, {"version": "5f68718b34a531a556f2f50300ead2862278da26", "lessThan": "cf5000a7787cbc10341091d37245a42c119d26c5", "status": "affected", "versionType": "git"}]}, {"product": "Linux", "vendor": "Linux", "defaultStatus": "affected", "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "programFiles": ["include/net/netfilter/nf_tables.h", "net/netfilter/nf_tables_api.c"], "versions": [{"version": "6.5", "status": "affected"}, {"version": "0", "lessThan": "6.5", "status": "unaffected", "versionType": "semver"}, {"version": "6.5.6", "lessThanOrEqual": "6.5.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.6", "lessThanOrEqual": "*", "status": "unaffected", "versionType": "original_commit_for_fix"}]}], "references": [{"url": "https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125"}, {"url": "https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01"}, {"url": "https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8"}, {"url": "https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171"}, {"url": "https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07"}, {"url": "https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14"}, {"url": "https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5"}], "title": "netfilter: nf_tables: fix memleak when more than 255 elements expired", "x_generator": {"engine": "bippy-5f407fcff5a0"}}, "adp": [{"problemTypes": [{"descriptions": [{"type": "CWE", "lang": "en", "description": "CWE-noinfo Not enough information"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.3, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-03-05T20:19:37.141289Z", "id": "CVE-2023-52581", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-11-07T14:54:23.969Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T23:03:21.164Z"}, "title": "CVE Program Container", "references": [{"url": "https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5", "tags": ["x_transferred"]}]}]}}