Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-23272— netfilter: nf_tables: unconditionally bump set->nelems before insertion

CVSS 7.8 · High EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-23272

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
netfilter: nf_tables: unconditionally bump set->nelems before insertion
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: unconditionally bump set->nelems before insertion In case that the set is full, a new element gets published then removed without waiting for the RCU grace period, while RCU reader can be walking over it already. To address this issue, add the element transaction even if set is full, but toggle the set_full flag to report -ENFILE so the abort path safely unwinds the set to its previous state. As for element updates, decrement set->nelems to restore it. A simpler fix is to call synchronize_rcu() in the error path. However, with a large batch adding elements to already maxed-out set, this could cause noticeable slowdown of such batches.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于nf_tables集合元素插入时未正确增加nelems计数,可能导致RCU读取器访问已释放元素。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 35d0ac9070ef619e3bf44324375878a1c540387b ~ 6826131c7674329335ca25df2550163eb8a1fd0c -
LinuxLinux 4.10 -

II. Public POCs for CVE-2026-23272

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-23272

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-03-20 · 8 CVEs total

CVE-2026-232787.8 HIGHnetfilter: nf_tables: always walk all pending catchall elements
CVE-2026-232757.8 HIGHio_uring: ensure ctx->rings is stable for task work flags manipulation
CVE-2026-232747.8 HIGHnetfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels
CVE-2026-232737.8 HIGHmacvlan: observe an RCU grace period in macvlan_common_newlink() error path
CVE-2026-232717.8 HIGHperf: Fix __perf_event_overflow() vs perf_remove_from_context() race
CVE-2026-23276net: add xmit recursion limit to tunnel xmit functions
CVE-2026-23277net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit

IV. Related Vulnerabilities

V. Comments for CVE-2026-23272

No comments yet


Leave a comment