跳转到帖子

Ubuntu: (CVE-2023-52923): linux-bluefield vulnerability

recommended_posts

发布于
  • Members

Ubuntu: (CVE-2023-52923): linux-bluefield vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/20/2025
Created
02/12/2025
Added
02/11/2025
Modified
02/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: adapt set backend to use GC transaction API Use the GC transaction API to replace the old and buggy gc API and the busy mark approach. No set elements are removed from async garbage collection anymore, instead the _DEAD bit is set on so the set element is not visible from lookup path anymore. Async GC enqueues transaction work that might be aborted and retried later. rbtree and pipapo set backends does not set on the _DEAD bit from the sync GC path since this runs in control plane path where mutex is held. In this case, set elements are deactivated, removed and then released via RCU callback, sync GC never fails.

Solution(s)

  • ubuntu-upgrade-linux-aws-fips
  • ubuntu-upgrade-linux-azure-fips
  • ubuntu-upgrade-linux-bluefield
  • ubuntu-upgrade-linux-fips
  • ubuntu-upgrade-linux-gcp-fips
  • ubuntu-upgrade-linux-intel-iot-realtime
  • ubuntu-upgrade-linux-realtime

References

  • https://attackerkb.com/topics/cve-2023-52923
  • CVE - 2023-52923
  • https://git.kernel.org/linus/f6c383b8c31a93752a52697f8430a71dcbc46adf
  • https://git.kernel.org/stable/c/146c76866795553dbc19998f36718d7986ad302b
  • https://git.kernel.org/stable/c/479a2cf5259347d6a1f658b0f791d27a34908e91
  • https://git.kernel.org/stable/c/c357648929c8dff891502349769aafb8f0452bc2
  • https://git.kernel.org/stable/c/cb4d00b563675ba8ff6ef94b077f58d816f68ba3
  • https://git.kernel.org/stable/c/df650d6a4bf47248261b61ef6b174d7c54034d15
  • https://git.kernel.org/stable/c/e4d71d6a9c7db93f7bf20c3a0f0659d63d7de681
  • https://git.kernel.org/stable/c/f6c383b8c31a93752a52697f8430a71dcbc46adf
  • https://www.cve.org/CVERecord?id=CVE-2023-52923
View more
  • 查看数 702
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…