CVE-2023-54200

Source
https://cve.org/CVERecord?id=CVE-2023-54200
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54200.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54200
Downstream
Published
2025-12-30T12:09:05.538Z
Modified
2026-03-20T12:33:29.655951Z
Summary
netfilter: nf_tables: always release netdev hooks from notifier
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: always release netdev hooks from notifier

This reverts "netfilter: nf_tables: skip netdev events generated on netns removal".

The problem is that when a veth device is released, the veth release callback will also queue the peer netns device for removal.

Its possible that the peer netns is also slated for removal. In this case, the device memory is already released before the pre_exit hook of the peer netns runs:

BUG: KASAN: slab-use-after-free in nfhookentryhead+0x1b8/0x1d0 Read of size 8 at addr ffff88812c0124f0 by task kworker/u8:1/45 Workqueue: netns cleanupnet Call Trace: nfhookentry_head+0x1b8/0x1d0 __nfunregisternethook+0x76/0x510 nftnetdevunregisterhooks+0xa0/0x220 __nftreleasehook+0x184/0x490 nftablespreexitnet+0x12f/0x1b0 ..

Order is: 1. First netns is released, vethdellink() queues peer netns device for removal 2. peer netns is queued for removal 3. peer netns device is released, unreg event is triggered 4. unreg event is ignored because netns is going down 5. preexit hook calls nftnetdevunregister_hooks but device memory might be free'd already.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54200.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
68a3765c659f809dcaac20030853a054646eb739
Fixed
8d56f00c61f67b450fbbdcb874855e60ad92c560
Fixed
30e4b13b1bfbdf3bf3b27036d8209ea1b9f0d880
Fixed
94032527efbac13be702c76afb9d872c0cca7a43
Fixed
dc1c9fd4a8bbe1e06add9053010b652449bfe411
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
90c7c58aa2bd02c65a4c63b7dfe0b16eab12cf9f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54200.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
5.15.113
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.30
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.3.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54200.json"