CVE-2026-23399 in Linux Kernel
要約 (英語)
In the Linux kernel, the following vulnerability has been resolved: nf_tables: nft_dynset: fix possible stateful expression memleak in error path If cloning the second stateful expression in the element via GFP_ATOMIC fails, then the first stateful expression remains in place without being released. unreferenced object (percpu) 0x607b97e9cab8 (size 16): comm "softirq", pid 0, jiffies 4294931867 hex dump (first 16 bytes on cpu 3): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 backtrace (crc 0): pcpu_alloc_noprof+0x453/0xd80 nft_counter_clone+0x9c/0x190 [nf_tables] nft_expr_clone+0x8f/0x1b0 [nf_tables] nft_dynset_new+0x2cb/0x5f0 [nf_tables] nft_rhash_update+0x236/0x11c0 [nf_tables] nft_dynset_eval+0x11f/0x670 [nf_tables] nft_do_chain+0x253/0x1700 [nf_tables] nft_do_chain_ipv4+0x18d/0x270 [nf_tables] nf_hook_slow+0xaa/0x1e0 ip_local_deliver+0x209/0x330
責任者
Linux
予約する
2026年01月13日
公開
2026年03月28日
エントリ
| 識別子 | 脆弱性 | CWE | ベース | テンポ | 0day | 本日 | 悪用可 | KEV | EPSS | CTI | 対策 | CVE |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 354072 | Linux Kernel nf_tables サービス拒否 | 401 | 4.8 | 4.6 | $0-$5k | $0-$5k | 未定義 | 0.00018 | 0.67 | 公式な修正 | CVE-2026-23399 |