In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: release flowtable after rcu grace period on error
Call synchronize_rcu() after unregistering the hooks from error path,
since a hook that already refers to this flowtable can be already
registered, exposing this flowtable to packet path and nfnetlink_hook
control plane.
This error path is rare, it should only happen by reaching the maximum
number hooks or by failing to set up to hardware offload, just call
synchronize_rcu().
There is a check for already used device hooks by different flowtable
that could result in EEXIST at this late stage. The hook parser can be
updated to perform this check earlier to this error path really becomes
rarely exercised.
Uncovered by KASAN reported as use-after-free from nfnetlink_hook path
when dumping hooks.
References
Configurations
Configuration 1 (hide)
|
History
24 Apr 2026, 18:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/7e3955b282eae20d61c75e499c75eade51c20060 - Patch | |
| References | () https://git.kernel.org/stable/c/adee3436ccd29f1e514c028899e400cbc6d84065 - Patch | |
| References | () https://git.kernel.org/stable/c/c8092edb9a11f20f95ccceeb9422b7dd0df337bd - Patch | |
| References | () https://git.kernel.org/stable/c/d2632de96ccb066e0131ad1494241b9c281c60b8 - Patch | |
| References | () https://git.kernel.org/stable/c/d73f4b53aaaea4c95f245e491aa5eeb8a21874ce - Patch | |
| References | () https://git.kernel.org/stable/c/e78a2dcc7cfb87b64a631441ca7681492b347ef6 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.16:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* |
|
| CWE | CWE-416 | |
| First Time |
Linux
Linux linux Kernel |
02 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
25 Mar 2026, 11:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-25 11:16
Updated : 2026-04-24 18:39
NVD link : CVE-2026-23392
Mitre link : CVE-2026-23392
CVE.ORG link : CVE-2026-23392
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
