CVE-2026-23231

Source
https://cve.org/CVERecord?id=CVE-2026-23231
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23231.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23231
Downstream
Related
Published
2026-03-04T12:58:42.029Z
Modified
2026-04-02T13:12:16.328208Z
Summary
netfilter: nf_tables: fix use-after-free in nf_tables_addchain()
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nftables: fix use-after-free in nftables_addchain()

nftablesaddchain() publishes the chain to table->chains via listaddtailrcu() (in nftchainadd()) before registering hooks. If nftablesregisterhook() then fails, the error path calls nftchaindel() (listdelrcu()) followed by nftableschain_destroy() with no RCU grace period in between.

This creates two use-after-free conditions:

1) Control-plane: nftablesdumpchains() traverses table->chains under rcuread_lock(). A concurrent dump can still be walking the chain when the error path frees it.

2) Packet path: for NFPROTOINET, nfregisternethook() briefly installs the IPv4 hook before IPv6 registration fails. Packets entering nftdochain() via the transient IPv4 hook can still be dereferencing chain->blobgenX when the error path frees the chain.

Add synchronizercu() between nftchain_del() and the chain destroy so that all RCU readers -- both dump threads and in-flight packet evaluation -- have finished before the chain is freed.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23231.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
91c7b38dc9f0de4f7f444b796d14476bc12df7bc
Fixed
2a6586ecfa4ce1413daaafee250d2590e05f1a33
Fixed
7017745068a9068904e1e7a1b170a5785647cc81
Fixed
f3fe58ce37926a10115ede527d59b91bcc05400a
Fixed
dbd0af8083dd201f07c49110b2ee93710abdff28
Fixed
2f9a4ffeb763aec822f8ff3d1e82202d27d46d4b
Fixed
71e99ee20fc3f662555118cf1159443250647533

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23231.json"