netfilter: nfnetlink_queue: make hash table per queue
Summary
| CVE | CVE-2026-43084 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-06 10:16:21 UTC |
| Updated | 2026-05-06 13:08:07 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
netfilter: nfnetlink_queue: make hash table per queue
Sharing a global hash table among all queues is tempting, but
it can cause crash:
BUG: KASAN: slab-use-after-free in nfqnl_recv_verdict+0x11ac/0x15e0 [nfnetlink_queue]
[..]
nfqnl_recv_verdict+0x11ac/0x15e0 [nfnetlink_queue]
nfnetlink_rcv_msg+0x46a/0x930
kmem_cache_alloc_node_noprof+0x11e/0x450
struct nf_queue_entry is freed via kfree, but parallel cpu can still
encounter such an nf_queue_entry when walking the list.
Alternative fix is to free the nf_queue_entry via kfree_rcu() instead,
but as we have to alloc/free for each skb this will cause more mem
pressure. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 371de2bef6582a3f58049b3d18e190924af9c9a0 22730cb96093b5be0609063bbb1923dbecd61252 git |
Not specified |
| CNA |
Linux |
Linux |
affected 870e3e63da8e88daffe9d692a025c711658018a8 41e3652a178cb0eecd48e0e6e27fbb73a004046a git |
Not specified |
| CNA |
Linux |
Linux |
affected 70e2e3ce4f6841e12ec1c104fc76c0e707398ec4 9e5ebef91120d2764aefe557c3a484b6288f341f git |
Not specified |
| CNA |
Linux |
Linux |
affected e19079adcd26a25d7d3e586b1837493361fdf8b6 936206e3f6ff411581e615e930263d6f8b78df9d git |
Not specified |
| CNA |
Linux |
Linux |
affected 6.12.75 6.12.83 semver |
Not specified |
| CNA |
Linux |
Linux |
affected 6.18.14 6.18.24 semver |
Not specified |
| CNA |
Linux |
Linux |
affected 6.19.4 6.19.14 semver |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/9e5ebef91120d2764aefe557c3a484b6288f341f |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/22730cb96093b5be0609063bbb1923dbecd61252 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/936206e3f6ff411581e615e930263d6f8b78df9d |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/41e3652a178cb0eecd48e0e6e27fbb73a004046a |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.