CVE-2023-53635
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.3 (inc) to 6.3.2 (inc) |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's netfilter conntrack subsystem involves incorrect handling of the timeout value for connection tracking entries. Specifically, the timeout value for unconfirmed connections was incorrectly calculated because a timestamp (nfct_time_stamp) was added twice when setting the timeout and subtracted incorrectly when retrieving it. This caused the timeout to be wrong until the connection was confirmed, potentially breaking conntrack creation via ctnetlink. The fix involved updating the code to set the timeout only after the connection is confirmed.
How can this vulnerability impact me? :
This vulnerability can impact systems by causing incorrect timeout values in the connection tracking subsystem, which may lead to failures or unexpected behavior in network connection tracking. This could disrupt network packet filtering, firewall rules, or network address translation that rely on accurate connection tracking, potentially affecting network reliability or security.