Use-after-free Vulnerability in Linux Kernel's Netfilter Component
CVE-2026-23351

7.8HIGH

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
25 March 2026

What is CVE-2026-23351?

A use-after-free vulnerability has been identified in the Netfilter component of the Linux kernel, specifically within the pipapo set type. This issue arises during garbage collection (GC) when handling a large number of expired elements, potentially leading to soft lockup warnings and RCU stall reports. The vulnerability could allow local denial of service attacks as expired elements remain accessible to both the packet path and userspace dumpers. The issue necessitates a modification of the GC process to ensure a clear distinction between unlink and reclaim phases and to effectively manage pointer swapping to avoid exposure of freed elements.

Affected Version(s)

Linux 3c4287f62044a90e73a561aa05fc46e62da173da < 16f3595c0441d87dfa005c47d8f95be213afaa9e

Linux 3c4287f62044a90e73a561aa05fc46e62da173da < 7864c667aed01a58b87ca518a631322cd0ac34c0

Linux 3c4287f62044a90e73a561aa05fc46e62da173da

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.