CVE-2023-53619Use After Free in Linux

CWE-416Use After Free6 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 95.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7
Latest updateApr 20

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free If nf_conntrack_init_start() fails (for example due to a register_nf_conntrack_bpf() failure), the nf_conntrack_helper_fini() clean-up path frees the nf_ct_helper_hash map. When built with NF_CONNTRACK=y, further netfilter modules (e.g: netfilter_conntrack_ftp) can still be loaded and call nf_conntrack_helpers_register(), independently of whether nf_conntrack initi

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel3.64.14.322+7
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux12f7a505331e6b2754684b509f2ac8f0011ce6444ee69c91cb8f9ca144bc0861969e5a1a3c6152a7+8
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

3
VulDB
Linux Kernel up to 6.4.3 nf_conntrack_init_start memory corruption (Nessus ID 276910 / WID-SEC-2025-2229)2026-04-20
GHSA
GHSA-fj8x-7xh8-225g: In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free If nf_conntrack_in2025-10-07
OSV
CVE-2023-53619: In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free If nf_conntrack_init2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free2025-10-07
Debian
CVE-2023-53619: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...2023