CVE-2026-23272

Source
https://cve.org/CVERecord?id=CVE-2026-23272
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23272.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23272
Downstream
Related
Published
2026-03-20T08:08:52.946Z
Modified
2026-04-18T18:29:45.214979705Z
Summary
netfilter: nf_tables: unconditionally bump set->nelems before insertion
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: unconditionally bump set->nelems before insertion

In case that the set is full, a new element gets published then removed without waiting for the RCU grace period, while RCU reader can be walking over it already.

To address this issue, add the element transaction even if set is full, but toggle the set_full flag to report -ENFILE so the abort path safely unwinds the set to its previous state.

As for element updates, decrement set->nelems to restore it.

A simpler fix is to call synchronize_rcu() in the error path. However, with a large batch adding elements to already maxed-out set, this could cause noticeable slowdown of such batches.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23272.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
35d0ac9070ef619e3bf44324375878a1c540387b
Fixed
6826131c7674329335ca25df2550163eb8a1fd0c
Fixed
ccb8c8f3c1127cf34d18c737309897c68046bf21
Fixed
def602e498a4f951da95c95b1b8ce8ae68aa733a
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
fefdd79403e89b0c673965343b92e2e01e2713a8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23272.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23272.json"