这是indexloc提供的服务,不要输入任何密码
Skip to content

In the Linux kernel, the following vulnerability has been...

Unreviewed Published Oct 7, 2025 to the GitHub Advisory Database • Updated Oct 7, 2025

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: fix wrong ct->timeout value

(struct nf_conn)->timeout is an interval before the conntrack
confirmed. After confirmed, it becomes a timestamp.

It is observed that timeout of an unconfirmed conntrack:

  • Set by calling ctnetlink_change_timeout(). As a result,
    nfct_time_stamp was wrongly added to ct->timeout twice.
  • Get by calling ctnetlink_dump_timeout(). As a result,
    nfct_time_stamp was wrongly subtracted.

Call Trace:

dump_stack_lvl
ctnetlink_dump_timeout
__ctnetlink_glue_build
ctnetlink_glue_build
__nfqnl_enqueue_packet
nf_queue
nf_hook_slow
ip_mc_output
? __pfx_ip_finish_output
ip_send_skb
? __pfx_dst_output
udp_send_skb
udp_sendmsg
? __pfx_ip_generic_getfrag
sock_sendmsg

Separate the 2 cases in:

  • Setting ct->timeout in __nf_ct_set_timeout().
  • Getting ct->timeout in ctnetlink_dump_timeout().

Pablo appends:

Update ctnetlink to set up the timeout after the IPS_CONFIRMED flag is
set on, otherwise conntrack creation via ctnetlink breaks.

Note that the problem described in this patch occurs since the
introduction of the nfnetlink_queue conntrack support, select a
sufficiently old Fixes: tag for -stable kernel to pick up this fix.

References

Published by the National Vulnerability Database Oct 7, 2025
Published to the GitHub Advisory Database Oct 7, 2025
Last updated Oct 7, 2025

Severity

Unknown

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(6th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2023-53635

GHSA ID

GHSA-v8v9-wq25-mffx

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.