CVE-2026-23399
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/03/2026
Last modified:
27/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nf_tables: nft_dynset: fix possible stateful expression memleak in error path<br />
<br />
If cloning the second stateful expression in the element via GFP_ATOMIC<br />
fails, then the first stateful expression remains in place without being<br />
released.<br />
<br />
unreferenced object (percpu) 0x607b97e9cab8 (size 16):<br />
comm "softirq", pid 0, jiffies 4294931867<br />
hex dump (first 16 bytes on cpu 3):<br />
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br />
backtrace (crc 0):<br />
pcpu_alloc_noprof+0x453/0xd80<br />
nft_counter_clone+0x9c/0x190 [nf_tables]<br />
nft_expr_clone+0x8f/0x1b0 [nf_tables]<br />
nft_dynset_new+0x2cb/0x5f0 [nf_tables]<br />
nft_rhash_update+0x236/0x11c0 [nf_tables]<br />
nft_dynset_eval+0x11f/0x670 [nf_tables]<br />
nft_do_chain+0x253/0x1700 [nf_tables]<br />
nft_do_chain_ipv4+0x18d/0x270 [nf_tables]<br />
nf_hook_slow+0xaa/0x1e0<br />
ip_local_deliver+0x209/0x330
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11.1 (including) | 6.12.78 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.11:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0548a13b5a145b16e4da0628b5936baf35f51b43
- https://git.kernel.org/stable/c/31641c682db73353e4647e40735c7f2a75ff58ef
- https://git.kernel.org/stable/c/c88a9fd26cee365bec932196f76175772a941cca
- https://git.kernel.org/stable/c/d1354873cbe3b344899c4311ac05897fd83e3f21
- https://git.kernel.org/stable/c/e6661add2d9c6913e1dad97336595e23a2bed195



