We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: possible module reference underflow in error path dst->ops is set on when nft_expr_clone() fails, but module refcount has not been bumped yet, therefore nft_expr_destroy() leads to module reference underflow.
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/b59bee8b05b0e789b5a298cacb09e8aaa3367a29
git.kernel.org/...c/1e52e6cfec6342c3d0df47dc3a76724fb3dabf56
git.kernel.org/...c/c485c35ff6783ccd12c160fcac6a0e504e83e0bf
Support options