In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: clean up hook list when offload flags check fails
splice back the hook list so nftchainrelease_hook() has a chance to release the hooks.
BUG: memory leak unreferenced object 0xffff88810180b100 (size 96): comm "syz-executor133", pid 3619, jiffies 4294945714 (age 12.690s) hex dump (first 32 bytes): 28 64 23 02 81 88 ff ff 28 64 23 02 81 88 ff ff (d#.....(d#..... 90 a8 aa 83 ff ff ff ff 00 00 b5 0f 81 88 ff ff ................ backtrace: [<ffffffff83a8c59b>] kmalloc include/linux/slab.h:600 [inline] [<ffffffff83a8c59b>] nftnetdevhookalloc+0x3b/0xc0 net/netfilter/nftablesapi.c:1901 [<ffffffff83a9239a>] nftchainparsenetdev net/netfilter/nftablesapi.c:1998 [inline] [<ffffffff83a9239a>] nftchainparsehook+0x33a/0x530 net/netfilter/nftablesapi.c:2073 [<ffffffff83a9b14b>] nftablesaddchain.constprop.0+0x10b/0x950 net/netfilter/nftablesapi.c:2218 [<ffffffff83a9c41b>] nftablesnewchain+0xa8b/0xc60 net/netfilter/nftablesapi.c:2593 [<ffffffff83a3d6a6>] nfnetlinkrcvbatch+0xa46/0xd20 net/netfilter/nfnetlink.c:517 [<ffffffff83a3db79>] nfnetlinkrcvskbbatch net/netfilter/nfnetlink.c:638 [inline] [<ffffffff83a3db79>] nfnetlinkrcv+0x1f9/0x220 net/netfilter/nfnetlink.c:656 [<ffffffff83a13b17>] netlinkunicastkernel net/netlink/afnetlink.c:1319 [inline] [<ffffffff83a13b17>] netlinkunicast+0x397/0x4c0 net/netlink/afnetlink.c:1345 [<ffffffff83a13fd6>] netlinksendmsg+0x396/0x710 net/netlink/afnetlink.c:1921 [<ffffffff83865ab6>] socksendmsgnosec net/socket.c:714 [inline] [<ffffffff83865ab6>] socksendmsg+0x56/0x80 net/socket.c:734 [<ffffffff8386601c>] syssendmsg+0x36c/0x390 net/socket.c:2482 [<ffffffff8386a918>] syssendmsg+0xa8/0x110 net/socket.c:2536 [<ffffffff8386aaa8>] _syssendmsg+0x88/0x100 net/socket.c:2565 [<ffffffff845e5955>] dosyscallx64 arch/x86/entry/common.c:50 [inline] [<ffffffff845e5955>] dosyscall64+0x35/0xb0 arch/x86/entry/common.c:80 [<ffffffff84800087>] entrySYSCALL64afterhwframe+0x63/0xcd