{"id":"CVE-2023-53619","summary":"netfilter: conntrack: Avoid nf_ct_helper_hash uses after free","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: conntrack: Avoid nf_ct_helper_hash uses after free\n\nIf nf_conntrack_init_start() fails (for example due to a\nregister_nf_conntrack_bpf() failure), the nf_conntrack_helper_fini()\nclean-up path frees the nf_ct_helper_hash map.\n\nWhen built with NF_CONNTRACK=y, further netfilter modules (e.g:\nnetfilter_conntrack_ftp) can still be loaded and call\nnf_conntrack_helpers_register(), independently of whether nf_conntrack\ninitialized correctly. This accesses the nf_ct_helper_hash dangling\npointer and causes a uaf, possibly leading to random memory corruption.\n\nThis patch guards nf_conntrack_helper_register() from accessing a freed\nor uninitialized nf_ct_helper_hash pointer and fixes possible\nuses-after-free when loading a conntrack module.","modified":"2026-04-02T09:44:37.565912Z","published":"2025-10-07T15:19:26.003Z","related":["SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4111-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4135-1","SUSE-SU-2025:4139-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4188-1","SUSE-SU-2025:4189-1","SUSE-SU-2025:4301-1","SUSE-SU-2025:4320-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53619.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/00716f25f9697d02a0d9bd622575c7c7321ba3d0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/05561f822f27b9fa88fa5504ddec34bf38833034"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4ee69c91cb8f9ca144bc0861969e5a1a3c6152a7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/61c7a5256543ae7d24cd9d21853d514c8632e1e9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6eef7a2b933885a17679eb8ed0796ddf0ee5309b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f03ce2f1abcb9f9d0511e3659ca6eb60e39f566"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8289d422f5e484efe4a565fe18e862ecd621c175"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fce5cc7cbd4b92f979bf02c9ec5fb69aaeba92d7"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53619.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53619"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"12f7a505331e6b2754684b509f2ac8f0011ce644"},{"fixed":"4ee69c91cb8f9ca144bc0861969e5a1a3c6152a7"},{"fixed":"00716f25f9697d02a0d9bd622575c7c7321ba3d0"},{"fixed":"61c7a5256543ae7d24cd9d21853d514c8632e1e9"},{"fixed":"8289d422f5e484efe4a565fe18e862ecd621c175"},{"fixed":"6f03ce2f1abcb9f9d0511e3659ca6eb60e39f566"},{"fixed":"05561f822f27b9fa88fa5504ddec34bf38833034"},{"fixed":"fce5cc7cbd4b92f979bf02c9ec5fb69aaeba92d7"},{"fixed":"6eef7a2b933885a17679eb8ed0796ddf0ee5309b"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53619.json"}}],"schema_version":"1.7.5"}