netfilter: xt_CT: drop pending enqueued packets on template removal
Summary
| CVE | CVE-2026-23391 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-25 11:16:39 UTC |
| Updated | 2026-04-02 15:16:32 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_CT: drop pending enqueued packets on template removal Templates refer to objects that can go away while packets are sitting in nfqueue refer to: - helper, this can be an issue on module removal. - timeout policy, nfnetlink_cttimeout might remove it. The use of templates with zone and event cache filter are safe, since this just copies values. Flush these enqueued packets in case the template rule gets removed. |
Risk And Classification
Primary CVSS: v3.1 7.8 HIGH from 416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.000320000 probability, percentile 0.091780000 (date 2026-04-02)
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Secondary | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 24de58f465165298aaa8f286b2592f0163706cfe d2d0bae0c9a2a17b6990a2966f5cdce0813d6256 git | Not specified |
| CNA | Linux | Linux | affected 24de58f465165298aaa8f286b2592f0163706cfe 63b8097cea1923fe82cd598068d0796da8c015ec git | Not specified |
| CNA | Linux | Linux | affected 24de58f465165298aaa8f286b2592f0163706cfe 19a230dec6bb8928e3f96387f9085cf2c79bcef9 git | Not specified |
| CNA | Linux | Linux | affected 24de58f465165298aaa8f286b2592f0163706cfe cb549925875fa06dd155e49db4ac2c5044c30f9c git | Not specified |
| CNA | Linux | Linux | affected 24de58f465165298aaa8f286b2592f0163706cfe 777d02efe3d630cca4c1b63962cec17c57711325 git | Not specified |
| CNA | Linux | Linux | affected 24de58f465165298aaa8f286b2592f0163706cfe f62a218a946b19bb59abdd5361da85fa4606b96b git | Not specified |
| CNA | Linux | Linux | affected 3.4 | Not specified |
| CNA | Linux | Linux | unaffected 3.4 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.167 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.130 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.78 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.20 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.10 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0-rc5 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/d2d0bae0c9a2a17b6990a2966f5cdce0813d6256 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/19a230dec6bb8928e3f96387f9085cf2c79bcef9 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/f62a218a946b19bb59abdd5361da85fa4606b96b | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/cb549925875fa06dd155e49db4ac2c5044c30f9c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/63b8097cea1923fe82cd598068d0796da8c015ec | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/777d02efe3d630cca4c1b63962cec17c57711325 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.