netfilter: bpf: defer hook memory release until rcu readers are done
Summary
| CVE | CVE-2026-23412 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-02 12:16:20 UTC |
| Updated | 2026-04-02 12:16:20 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
netfilter: bpf: defer hook memory release until rcu readers are done
Yiming Qian reports UaF when concurrent process is dumping hooks via
nfnetlink_hooks:
BUG: KASAN: slab-use-after-free in nfnl_hook_dump_one.isra.0+0xe71/0x10f0
Read of size 8 at addr ffff888003edbf88 by task poc/79
Call Trace:
<TASK>
nfnl_hook_dump_one.isra.0+0xe71/0x10f0
netlink_dump+0x554/0x12b0
nfnl_hook_get+0x176/0x230
[..]
Defer release until after concurrent readers have completed. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 84601d6ee68ae820dec97450934797046d62db4b d016c216bc75c45128160593a77b864a04dbe7c0 git |
Not specified |
| CNA |
Linux |
Linux |
affected 84601d6ee68ae820dec97450934797046d62db4b cb2bf5efdb02a2a59faf603604a1066e8266f349 git |
Not specified |
| CNA |
Linux |
Linux |
affected 84601d6ee68ae820dec97450934797046d62db4b c25e0dec366ae99b7264324ce3c7cbaea34691f9 git |
Not specified |
| CNA |
Linux |
Linux |
affected 84601d6ee68ae820dec97450934797046d62db4b 54244d54a971c26a0cd0a9073460ff71f3c51b32 git |
Not specified |
| CNA |
Linux |
Linux |
affected 84601d6ee68ae820dec97450934797046d62db4b 24f90fa3994b992d1a09003a3db2599330a5232a git |
Not specified |
| CNA |
Linux |
Linux |
affected 6.4 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.4 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.130 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.78 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.20 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.10 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0-rc5 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/d016c216bc75c45128160593a77b864a04dbe7c0 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/cb2bf5efdb02a2a59faf603604a1066e8266f349 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/24f90fa3994b992d1a09003a3db2599330a5232a |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/54244d54a971c26a0cd0a9073460ff71f3c51b32 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/c25e0dec366ae99b7264324ce3c7cbaea34691f9 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.