
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-52999 is a vulnerability discovered in the Linux kernel's network namespace operations registration error path. The vulnerability was disclosed on March 27, 2025, affecting multiple versions of the Linux kernel including versions from 4.19.264 to 6.2. The issue occurs when netassigngeneric() fails, causing an error in the ops_init() function where it attempts to clear the gen pointer slot incorrectly (NVD).
The vulnerability is classified as a Use-After-Free (CWE-416) issue in the Linux kernel's network subsystem. When netassigngeneric() fails, the error path in ops_init() attempts to clear the gen pointer slot, but since the gen pointer hasn't been modified yet, it results in an out-of-bounds error. The vulnerability has received a CVSS v3.1 base score of 7.8 (High), with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, CISA-ADP).
The vulnerability can lead to a total loss of confidentiality, integrity, and availability in the affected systems. When successfully exploited, it allows an attacker with local access to potentially gain elevated privileges and execute arbitrary code, leading to system compromise (Snyk).
Multiple Linux distributions have released patches to address this vulnerability. Fixed versions include Linux kernel 5.10.223-1 for Debian Bullseye, 6.1.129-1 for Bookworm, and 6.12.21-1 for Sid/Trixie. The fix involves skipping the gen pointer de-reference in the mentioned error-path (Debian).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."