SB20251230166 - Use-after-free in Linux kernel netfilter
Published: December 30, 2025 Updated: December 31, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-54200)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nft_netdev_event() and nf_tables_netdev_event() functions in net/netfilter/nft_chain_filter.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/30e4b13b1bfbdf3bf3b27036d8209ea1b9f0d880
- https://git.kernel.org/stable/c/8d56f00c61f67b450fbbdcb874855e60ad92c560
- https://git.kernel.org/stable/c/94032527efbac13be702c76afb9d872c0cca7a43
- https://git.kernel.org/stable/c/dc1c9fd4a8bbe1e06add9053010b652449bfe411
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.113
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.30
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4