The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-52433

CVE-2023-52433: Linux Kernel Use-After-Free Vulnerability

CVE-2023-52433 is a use-after-free flaw in the Linux Kernel's netfilter nft_set_rbtree component that could allow access to released objects. This post covers the technical details, affected versions, and mitigation.

Published: February 4, 2026

CVE-2023-52433 Overview

CVE-2023-52433 is a vulnerability in the Linux kernel's netfilter subsystem, specifically affecting the nft_set_rbtree component. The flaw involves improper handling of synchronous garbage collection (GC) for newly added elements within ongoing transactions. When new elements are added to an nftables set backed by the red-black tree implementation, these elements may expire before the transaction completes. If synchronous GC processes these elements prematurely, the commit path can access already-released memory objects, leading to system instability or denial of service conditions.

Critical Impact

Local attackers with high privileges can trigger a denial of service condition by exploiting the race condition between transaction handling and garbage collection in the netfilter subsystem.

Affected Products

  • Linux Kernel (multiple versions)
  • NetApp ONTAP Tools 9 for VMware vSphere
  • NetApp ONTAP Tools 10 for VMware vSphere

Discovery Timeline

  • February 20, 2024 - CVE-2023-52433 published to NVD
  • March 25, 2025 - Last updated in NVD database

Technical Details for CVE-2023-52433

Vulnerability Analysis

The vulnerability exists in the netfilter framework's nft_set_rbtree implementation, which provides red-black tree-based set storage for nftables firewall rules. The core issue stems from a race condition between the synchronous garbage collection mechanism and transaction handling for set elements.

When new elements are inserted into an rbtree-backed nftables set, they may have timeout values that cause them to expire before the containing transaction commits. The synchronous GC process, designed to clean up expired elements, does not properly account for elements that are still part of an uncommitted transaction. This can result in the GC freeing memory that the transaction commit path subsequently attempts to access, creating a use-after-free condition.

The fix implements a check to skip synchronous GC for elements that are part of the current transaction. Once the transaction finishes (either through commit or abort), the asynchronous GC mechanism safely handles cleanup of any expired elements. This approach ensures proper synchronization between element lifecycle management and transaction boundaries.

Root Cause

The root cause is improper check for unusual or exceptional conditions (CWE-273) in the garbage collection logic. The synchronous GC routine failed to verify whether elements were part of an active transaction before processing them for removal, leading to premature deallocation of memory still referenced by the transaction commit path.

Attack Vector

Exploitation requires local access to the system with elevated privileges to interact with the netfilter subsystem. An attacker would need to craft specific nftables transactions involving set elements with timeout configurations that trigger the race condition between element expiration and transaction completion. While the attack vector is limited due to the privilege requirements, successful exploitation can cause kernel crashes or system instability, resulting in denial of service.

Detection Methods for CVE-2023-52433

Indicators of Compromise

  • Kernel panic or oops messages referencing nft_set_rbtree or netfilter components
  • Unexpected system crashes during nftables rule manipulation
  • Kernel log entries showing use-after-free warnings in netfilter subsystem
  • Core dumps containing stack traces through nft_rbtree_gc functions

Detection Strategies

  • Monitor kernel logs for oops or panic messages related to netfilter operations
  • Implement kernel memory debugging tools such as KASAN to detect use-after-free conditions
  • Track nftables configuration changes and correlate with system stability events
  • Deploy endpoint detection solutions capable of monitoring kernel-level anomalies

Monitoring Recommendations

  • Enable kernel auditing for netfilter and nftables operations
  • Configure alerting for unexpected kernel module crashes or restarts
  • Monitor system uptime metrics for anomalous restart patterns
  • Implement centralized log collection for kernel messages across affected systems

How to Mitigate CVE-2023-52433

Immediate Actions Required

  • Update Linux kernel to a patched version containing the fix for CVE-2023-52433
  • Apply vendor patches from NetApp for ONTAP Tools deployments on affected versions
  • Review and audit nftables configurations using timeout-based set elements
  • Consider temporary removal of timeout configurations on critical firewall rules until patches are applied

Patch Information

Multiple kernel patches have been released to address this vulnerability. The fix modifies the nft_set_rbtree code to skip synchronous garbage collection for elements that are part of an active transaction, delegating cleanup to the asynchronous GC after transaction completion.

Patch commits are available from the kernel git repository:

  • Kernel Git Commit 03caf75
  • Kernel Git Commit 2ee52ae
  • Kernel Git Commit 9a8c544
  • Kernel Git Commit 9af7dfb
  • Kernel Git Commit 9db9feb
  • Kernel Git Commit c323ed6
  • Kernel Git Commit e3213ff

For NetApp ONTAP Tools, refer to the NetApp Security Advisory NTAP-20240828-0003 for vendor-specific guidance.

Workarounds

  • Avoid using timeout configurations in nftables sets until the kernel is patched
  • Limit nftables administrative access to reduce the attack surface
  • Consider using alternative set backends (hash, bitmap) that are not affected by this specific issue
  • Implement network segmentation to limit exposure of systems where immediate patching is not feasible
bash
# Check current kernel version for vulnerability assessment
uname -r

# List nftables sets with timeout configurations (potential risk areas)
nft list sets

# Verify loaded netfilter modules
lsmod | grep nf_tables

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeUse After Free

  • Vendor/TechLinux Kernel

  • SeverityMEDIUM

  • CVSS Score4.4

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-273
  • Technical References
  • NetApp Security Advisory NTAP-20240828-0003
  • Vendor Resources
  • Kernel Git Commit Update 1

  • Kernel Git Commit Update 2

  • Kernel Git Commit Update 3

  • Kernel Git Commit Update 4

  • Kernel Git Commit Update 5

  • Kernel Git Commit Update 6

  • Kernel Git Commit Update 7
  • Related CVEs
  • CVE-2026-31745: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43048: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43049: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43056: Linux Kernel Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English