CVE-2026-23399 in Linux Kernel情報

要約 (英語)

In the Linux kernel, the following vulnerability has been resolved: nf_tables: nft_dynset: fix possible stateful expression memleak in error path If cloning the second stateful expression in the element via GFP_ATOMIC fails, then the first stateful expression remains in place without being released.   unreferenced object (percpu) 0x607b97e9cab8 (size 16):     comm "softirq", pid 0, jiffies 4294931867     hex dump (first 16 bytes on cpu 3):       00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00     backtrace (crc 0):       pcpu_alloc_noprof+0x453/0xd80       nft_counter_clone+0x9c/0x190 [nf_tables]       nft_expr_clone+0x8f/0x1b0 [nf_tables]       nft_dynset_new+0x2cb/0x5f0 [nf_tables]       nft_rhash_update+0x236/0x11c0 [nf_tables]       nft_dynset_eval+0x11f/0x670 [nf_tables]       nft_do_chain+0x253/0x1700 [nf_tables]       nft_do_chain_ipv4+0x18d/0x270 [nf_tables]       nf_hook_slow+0xaa/0x1e0       ip_local_deliver+0x209/0x330

責任者

Linux

予約する

2026年01月13日

公開

2026年03月28日

エントリ

識別子脆弱性CWEベーステンポ0day本日悪用可KEVEPSSCTI対策CVE
354072Linux Kernel nf_tables サービス拒否4014.84.6$0-$5k$0-$5k未定義 0.000180.67公式な修正CVE-2026-23399

もっと見る

Do you want to use VulDB in your project?

Use the official API to access entries easily!