SB2025100468 - Use-after-free in Linux kernel netfilter
Published: October 4, 2025 Updated: October 27, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-53566)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nft_rbtree_gc_elem() and __nft_rbtree_insert() functions in net/netfilter/nft_set_rbtree.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/3fa13203b6d90cc3a33af47b058739f92ab82eef
- https://git.kernel.org/stable/c/61ae320a29b0540c16931816299eb86bf2b66c08
- https://git.kernel.org/stable/c/899aa5638568abf5d69de7a7bb95e4615157375b
- https://git.kernel.org/stable/c/a337706c1fb35aac3f26b48aca80421bdbe1d33a
- https://git.kernel.org/stable/c/a836be60a3aabcedcd9c79f545d409ace1f20ba6
- https://git.kernel.org/stable/c/b76db53ee8802ee5683f8cb401d7e2ec6f9b3d56
- https://git.kernel.org/stable/c/ec5caa765f7f6960011c919c9aeb1467940421f6
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.113