Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-06576

Опубликовано: 09 авг. 2023
Источник: fstec
CVSS3: 7.3
CVSS2: 7.5
EPSS Низкий

Описание

Уязвимость функции nf_tables_dump_setelem() модуля net/netfilter/nf_tables_api.c компонента netfilter ядра операционной системы Linux связана с недостаточным контролем ресурса в период его существовования. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании

Вендор

ООО «Ред Софт»
Сообщество свободного программного обеспечения

Наименование ПО

РЕД ОС
Linux

Версия ПО

7.3 (РЕД ОС)
от 6.2 до 6.4.10 включительно (Linux)
от 5.11 до 5.15.133 включительно (Linux)
от 5.16 до 6.1.55 включительно (Linux)
от 5.5 до 5.10.197 включительно (Linux)
от 4.20 до 5.4.261 включительно (Linux)
от 4.1 до 4.19.315 включительно (Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

ООО «Ред Софт» РЕД ОС 7.3
Сообщество свободного программного обеспечения Linux от 6.2 до 6.4.10 включительно
Сообщество свободного программного обеспечения Linux от 5.11 до 5.15.133 включительно
Сообщество свободного программного обеспечения Linux от 5.16 до 6.1.55 включительно
Сообщество свободного программного обеспечения Linux от 5.5 до 5.10.197 включительно
Сообщество свободного программного обеспечения Linux от 4.20 до 5.4.261 включительно
Сообщество свободного программного обеспечения Linux от 4.1 до 4.19.315 включительно

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,5)
Высокий уровень опасности (базовая оценка CVSS 3.1 составляет 7,3)

Возможные меры по устранению уязвимости

В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Linux:
https://git.kernel.org/stable/c/94313a196b44184b5b52c1876da6a537701b425a
https://git.kernel.org/stable/c/1da4874d05da1526b11b82fc7f3c7ac38749ddf8
https://git.kernel.org/stable/c/b15ea4017af82011dd55225ce77cce3d4dfc169c
https://git.kernel.org/stable/c/7c7e658a36f8b1522bd3586d8137e5f93a25ddc5
https://git.kernel.org/stable/c/59dab3bf0b8fc08eb802721c0532f13dd89209b8
https://git.kernel.org/stable/c/bd156ce9553dcaf2d6ee2c825d1a5a1718e86524
https://git.kernel.org/stable/c/24138933b97b055d486e8064b4a1721702442a9b
https://lore.kernel.org/linux-cve-announce/2025020500-CVE-2023-52924-03d7@gregkh/
https://git.kernel.org/linus/24138933b97b055d486e8064b4a1721702442a9b
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.316
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.262
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.198
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.134
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.56
https://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.11
Для РедоС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 36%
0.00144
Низкий

7.3 High

CVSS3

7.5 High

CVSS2

Связанные уязвимости

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: don't skip expired elements during walk There is an asymmetry between commit/abort and preparation phase if the following conditions are met: 1. set is a verdict map ("1.2.3.4 : jump foo") 2. timeouts are enabled In this case, following sequence is problematic: 1. element E in set S refers to chain C 2. userspace requests removal of set S 3. kernel does a set walk to decrement chain->use count for all elements from preparation phase 4. kernel does another set walk to remove elements from the commit phase (or another walk to do a chain->use increment for all elements from abort phase) If E has already expired in 1), it will be ignored during list walk, so its use count won't have been changed. Then, when set is culled, ->destroy callback will zap the element via nf_tables_set_elem_destroy(), but this function is only safe for elements that have been deactivated earlier from the preparatio...

CVSS3: 5.5
redhat
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: don't skip expired elements during walk There is an asymmetry between commit/abort and preparation phase if the following conditions are met: 1. set is a verdict map ("1.2.3.4 : jump foo") 2. timeouts are enabled In this case, following sequence is problematic: 1. element E in set S refers to chain C 2. userspace requests removal of set S 3. kernel does a set walk to decrement chain->use count for all elements from preparation phase 4. kernel does another set walk to remove elements from the commit phase (or another walk to do a chain->use increment for all elements from abort phase) If E has already expired in 1), it will be ignored during list walk, so its use count won't have been changed. Then, when set is culled, ->destroy callback will zap the element via nf_tables_set_elem_destroy(), but this function is only safe for elements that have been deactivated earlier from the preparation phase...

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: don't skip expired elements during walk There is an asymmetry between commit/abort and preparation phase if the following conditions are met: 1. set is a verdict map ("1.2.3.4 : jump foo") 2. timeouts are enabled In this case, following sequence is problematic: 1. element E in set S refers to chain C 2. userspace requests removal of set S 3. kernel does a set walk to decrement chain->use count for all elements from preparation phase 4. kernel does another set walk to remove elements from the commit phase (or another walk to do a chain->use increment for all elements from abort phase) If E has already expired in 1), it will be ignored during list walk, so its use count won't have been changed. Then, when set is culled, ->destroy callback will zap the element via nf_tables_set_elem_destroy(), but this function is only safe for elements that have been deactivated earlier from the pre

debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: n ...

github
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: don't skip expired elements during walk There is an asymmetry between commit/abort and preparation phase if the following conditions are met: 1. set is a verdict map ("1.2.3.4 : jump foo") 2. timeouts are enabled In this case, following sequence is problematic: 1. element E in set S refers to chain C 2. userspace requests removal of set S 3. kernel does a set walk to decrement chain->use count for all elements from preparation phase 4. kernel does another set walk to remove elements from the commit phase (or another walk to do a chain->use increment for all elements from abort phase) If E has already expired in 1), it will be ignored during list walk, so its use count won't have been changed. Then, when set is culled, ->destroy callback will zap the element via nf_tables_set_elem_destroy(), but this function is only safe for elements that have been deactivated earlier from the ...

EPSS

Процентиль: 36%
0.00144
Низкий

7.3 High

CVSS3

7.5 High

CVSS2

Уязвимость BDU:2025-06576