CVE-2023-53492
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's netfilter nf_tables component. When adding a rule to a chain by referring to the chain's ID, if that chain was deleted earlier in the same batch operation, the rule might incorrectly refer to the deleted chain. This happens because the lookup function ignored the genmask, causing the system to not detect that the chain was deleted. This can lead to kernel warnings and potential instability. The fix ensures that the genmask is considered during lookup, preventing rules from referencing deleted chains.
How can this vulnerability impact me? :
The vulnerability can cause kernel warnings and potentially unstable behavior in the Linux kernel's netfilter subsystem. Specifically, rules may end up referring to deleted chains, which can lead to unexpected errors or crashes in network filtering operations. This could affect system reliability and network security enforcement.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for WARNING messages related to nf_tables_chain_destroy, specifically messages like: "WARNING: CPU: ... at net/netfilter/nf_tables_api.c:2037 nf_tables_chain_destroy+0x23d/0x260". Checking the kernel log using commands such as `dmesg | grep nf_tables_chain_destroy` or `journalctl -k | grep nf_tables_chain_destroy` can help identify if the warning has occurred.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the issue is resolved, as the vulnerability is fixed by ensuring the genmask is not ignored when looking up a chain by ID in nf_tables. Until the update is applied, monitor for the warning messages and avoid adding rules to chains that have been deleted in the same batch to prevent referencing deleted chains.