SB2025100856 - Use-after-free in Linux kernel netfilter
Published: October 8, 2025 Updated: October 26, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-53619)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nf_conntrack_helper_register() and nf_conntrack_helper_fini() functions in net/netfilter/nf_conntrack_helper.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/00716f25f9697d02a0d9bd622575c7c7321ba3d0
- https://git.kernel.org/stable/c/05561f822f27b9fa88fa5504ddec34bf38833034
- https://git.kernel.org/stable/c/4ee69c91cb8f9ca144bc0861969e5a1a3c6152a7
- https://git.kernel.org/stable/c/61c7a5256543ae7d24cd9d21853d514c8632e1e9
- https://git.kernel.org/stable/c/6eef7a2b933885a17679eb8ed0796ddf0ee5309b
- https://git.kernel.org/stable/c/6f03ce2f1abcb9f9d0511e3659ca6eb60e39f566
- https://git.kernel.org/stable/c/8289d422f5e484efe4a565fe18e862ecd621c175
- https://git.kernel.org/stable/c/fce5cc7cbd4b92f979bf02c9ec5fb69aaeba92d7
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.4