Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-23278— netfilter: nf_tables: always walk all pending catchall elements

CVSS 7.8 · High EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-23278

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
netfilter: nf_tables: always walk all pending catchall elements
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: always walk all pending catchall elements During transaction processing we might have more than one catchall element: 1 live catchall element and 1 pending element that is coming as part of the new batch. If the map holding the catchall elements is also going away, its required to toggle all catchall elements and not just the first viable candidate. Otherwise, we get: WARNING: ./include/net/netfilter/nf_tables.h:1281 at nft_data_release+0xb7/0xe0 [nf_tables], CPU#2: nft/1404 RIP: 0010:nft_data_release+0xb7/0xe0 [nf_tables] [..] __nft_set_elem_destroy+0x106/0x380 [nf_tables] nf_tables_abort_release+0x348/0x8d0 [nf_tables] nf_tables_abort+0xcf2/0x3ac0 [nf_tables] nfnetlink_rcv_batch+0x9c9/0x20e0 [..]
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于nf_tables未遍历所有待处理的catchall元素,可能导致集合销毁时访问已释放数据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 628bd3e49cba1c066228e23d71a852c23e26da73 ~ eb0948fa13298212c5f8b30ee48efdae4389ab09 -
LinuxLinux 6.4 -

II. Public POCs for CVE-2026-23278

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-23278

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-03-20 · 8 CVEs total

CVE-2026-232757.8 HIGHio_uring: ensure ctx->rings is stable for task work flags manipulation
CVE-2026-232747.8 HIGHnetfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels
CVE-2026-232737.8 HIGHmacvlan: observe an RCU grace period in macvlan_common_newlink() error path
CVE-2026-232727.8 HIGHnetfilter: nf_tables: unconditionally bump set->nelems before insertion
CVE-2026-232717.8 HIGHperf: Fix __perf_event_overflow() vs perf_remove_from_context() race
CVE-2026-23276net: add xmit recursion limit to tunnel xmit functions
CVE-2026-23277net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit

IV. Related Vulnerabilities

V. Comments for CVE-2026-23278

No comments yet


Leave a comment