CVE-2023-54200 (GCVE-0-2023-54200)
Vulnerability from cvelistv5 – Published: 2025-12-30 12:09 – Updated: 2025-12-30 12:09
VLAI?
Title
netfilter: nf_tables: always release netdev hooks from notifier
Summary
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: always release netdev hooks from notifier
This reverts "netfilter: nf_tables: skip netdev events generated on netns removal".
The problem is that when a veth device is released, the veth release
callback will also queue the peer netns device for removal.
Its possible that the peer netns is also slated for removal. In this
case, the device memory is already released before the pre_exit hook of
the peer netns runs:
BUG: KASAN: slab-use-after-free in nf_hook_entry_head+0x1b8/0x1d0
Read of size 8 at addr ffff88812c0124f0 by task kworker/u8:1/45
Workqueue: netns cleanup_net
Call Trace:
nf_hook_entry_head+0x1b8/0x1d0
__nf_unregister_net_hook+0x76/0x510
nft_netdev_unregister_hooks+0xa0/0x220
__nft_release_hook+0x184/0x490
nf_tables_pre_exit_net+0x12f/0x1b0
..
Order is:
1. First netns is released, veth_dellink() queues peer netns device
for removal
2. peer netns is queued for removal
3. peer netns device is released, unreg event is triggered
4. unreg event is ignored because netns is going down
5. pre_exit hook calls nft_netdev_unregister_hooks but device memory
might be free'd already.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
68a3765c659f809dcaac20030853a054646eb739 , < 8d56f00c61f67b450fbbdcb874855e60ad92c560
(git)
Affected: 68a3765c659f809dcaac20030853a054646eb739 , < 30e4b13b1bfbdf3bf3b27036d8209ea1b9f0d880 (git) Affected: 68a3765c659f809dcaac20030853a054646eb739 , < 94032527efbac13be702c76afb9d872c0cca7a43 (git) Affected: 68a3765c659f809dcaac20030853a054646eb739 , < dc1c9fd4a8bbe1e06add9053010b652449bfe411 (git) Affected: 90c7c58aa2bd02c65a4c63b7dfe0b16eab12cf9f (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/netfilter/nft_chain_filter.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "8d56f00c61f67b450fbbdcb874855e60ad92c560",
"status": "affected",
"version": "68a3765c659f809dcaac20030853a054646eb739",
"versionType": "git"
},
{
"lessThan": "30e4b13b1bfbdf3bf3b27036d8209ea1b9f0d880",
"status": "affected",
"version": "68a3765c659f809dcaac20030853a054646eb739",
"versionType": "git"
},
{
"lessThan": "94032527efbac13be702c76afb9d872c0cca7a43",
"status": "affected",
"version": "68a3765c659f809dcaac20030853a054646eb739",
"versionType": "git"
},
{
"lessThan": "dc1c9fd4a8bbe1e06add9053010b652449bfe411",
"status": "affected",
"version": "68a3765c659f809dcaac20030853a054646eb739",
"versionType": "git"
},
{
"status": "affected",
"version": "90c7c58aa2bd02c65a4c63b7dfe0b16eab12cf9f",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"net/netfilter/nft_chain_filter.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.15"
},
{
"lessThan": "5.15",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.113",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.30",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.3.*",
"status": "unaffected",
"version": "6.3.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.4",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.113",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.30",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.4",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.14.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: always release netdev hooks from notifier\n\nThis reverts \"netfilter: nf_tables: skip netdev events generated on netns removal\".\n\nThe problem is that when a veth device is released, the veth release\ncallback will also queue the peer netns device for removal.\n\nIts possible that the peer netns is also slated for removal. In this\ncase, the device memory is already released before the pre_exit hook of\nthe peer netns runs:\n\nBUG: KASAN: slab-use-after-free in nf_hook_entry_head+0x1b8/0x1d0\nRead of size 8 at addr ffff88812c0124f0 by task kworker/u8:1/45\nWorkqueue: netns cleanup_net\nCall Trace:\n nf_hook_entry_head+0x1b8/0x1d0\n __nf_unregister_net_hook+0x76/0x510\n nft_netdev_unregister_hooks+0xa0/0x220\n __nft_release_hook+0x184/0x490\n nf_tables_pre_exit_net+0x12f/0x1b0\n ..\n\nOrder is:\n1. First netns is released, veth_dellink() queues peer netns device\n for removal\n2. peer netns is queued for removal\n3. peer netns device is released, unreg event is triggered\n4. unreg event is ignored because netns is going down\n5. pre_exit hook calls nft_netdev_unregister_hooks but device memory\n might be free\u0027d already."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-30T12:09:05.538Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/8d56f00c61f67b450fbbdcb874855e60ad92c560"
},
{
"url": "https://git.kernel.org/stable/c/30e4b13b1bfbdf3bf3b27036d8209ea1b9f0d880"
},
{
"url": "https://git.kernel.org/stable/c/94032527efbac13be702c76afb9d872c0cca7a43"
},
{
"url": "https://git.kernel.org/stable/c/dc1c9fd4a8bbe1e06add9053010b652449bfe411"
}
],
"title": "netfilter: nf_tables: always release netdev hooks from notifier",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-54200",
"datePublished": "2025-12-30T12:09:05.538Z",
"dateReserved": "2025-12-30T12:06:44.499Z",
"dateUpdated": "2025-12-30T12:09:05.538Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-54200\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-30T13:16:08.100\",\"lastModified\":\"2025-12-31T20:43:05.160\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: nf_tables: always release netdev hooks from notifier\\n\\nThis reverts \\\"netfilter: nf_tables: skip netdev events generated on netns removal\\\".\\n\\nThe problem is that when a veth device is released, the veth release\\ncallback will also queue the peer netns device for removal.\\n\\nIts possible that the peer netns is also slated for removal. In this\\ncase, the device memory is already released before the pre_exit hook of\\nthe peer netns runs:\\n\\nBUG: KASAN: slab-use-after-free in nf_hook_entry_head+0x1b8/0x1d0\\nRead of size 8 at addr ffff88812c0124f0 by task kworker/u8:1/45\\nWorkqueue: netns cleanup_net\\nCall Trace:\\n nf_hook_entry_head+0x1b8/0x1d0\\n __nf_unregister_net_hook+0x76/0x510\\n nft_netdev_unregister_hooks+0xa0/0x220\\n __nft_release_hook+0x184/0x490\\n nf_tables_pre_exit_net+0x12f/0x1b0\\n ..\\n\\nOrder is:\\n1. First netns is released, veth_dellink() queues peer netns device\\n for removal\\n2. peer netns is queued for removal\\n3. peer netns device is released, unreg event is triggered\\n4. unreg event is ignored because netns is going down\\n5. pre_exit hook calls nft_netdev_unregister_hooks but device memory\\n might be free\u0027d already.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/30e4b13b1bfbdf3bf3b27036d8209ea1b9f0d880\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8d56f00c61f67b450fbbdcb874855e60ad92c560\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/94032527efbac13be702c76afb9d872c0cca7a43\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dc1c9fd4a8bbe1e06add9053010b652449bfe411\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…