CVE-2026-23392
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
25/03/2026
Última modificación:
25/03/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: nf_tables: release flowtable after rcu grace period on error<br />
<br />
Call synchronize_rcu() after unregistering the hooks from error path,<br />
since a hook that already refers to this flowtable can be already<br />
registered, exposing this flowtable to packet path and nfnetlink_hook<br />
control plane.<br />
<br />
This error path is rare, it should only happen by reaching the maximum<br />
number hooks or by failing to set up to hardware offload, just call<br />
synchronize_rcu().<br />
<br />
There is a check for already used device hooks by different flowtable<br />
that could result in EEXIST at this late stage. The hook parser can be<br />
updated to perform this check earlier to this error path really becomes<br />
rarely exercised.<br />
<br />
Uncovered by KASAN reported as use-after-free from nfnetlink_hook path<br />
when dumping hooks.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/7e3955b282eae20d61c75e499c75eade51c20060
- https://git.kernel.org/stable/c/adee3436ccd29f1e514c028899e400cbc6d84065
- https://git.kernel.org/stable/c/c8092edb9a11f20f95ccceeb9422b7dd0df337bd
- https://git.kernel.org/stable/c/d2632de96ccb066e0131ad1494241b9c281c60b8
- https://git.kernel.org/stable/c/d73f4b53aaaea4c95f245e491aa5eeb8a21874ce
- https://git.kernel.org/stable/c/e78a2dcc7cfb87b64a631441ca7681492b347ef6



