In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: possible module reference underflow in error path
dst->ops is set on when nft_expr_clone() fails, but module refcount has not been bumped yet, therefore nft_expr_destroy() leads to module reference underflow.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 5.11 | 5.15.63 |
| linux / linux_kernel | 5.16 | 5.19.4 |
| linux / linux_kernel | 6.0-rc1 | 6.0-rc1.x |