CVE-2023-54035
Unknown Unknown - Not Provided
Reference Counter Underflow in Linux Kernel netfilter nf_tables

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix underflow in chain reference counter Set element addition error path decrements reference counter on chains twice: once on element release and again via nft_data_release(). Then, d6b478666ffa ("netfilter: nf_tables: fix underflow in object reference counter") incorrectly fixed this by removing the stateful object reference count decrement. Restore the stateful object decrement as in b91d90368837 ("netfilter: nf_tables: fix leaking object reference count") and let nft_data_release() decrement the chain reference counter, so this is done only once.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's netfilter nf_tables component. It involves an error in managing reference counters for chains when adding set elements. Specifically, the reference counter for chains is decremented twice erroneously: once when an element is released and again via nft_data_release(). A previous fix incorrectly removed a necessary decrement, causing issues. The final fix restores the correct decrement behavior to ensure the reference counter is decremented only once, preventing underflow.


How can this vulnerability impact me? :

The vulnerability can cause the reference counter for chains in nf_tables to underflow due to incorrect decrementing. This could potentially lead to memory management issues such as use-after-free or other stability problems in the Linux kernel's netfilter subsystem, which might affect system reliability or security.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart