CVE-2026-23272

Published: Mar 20, 2026 Last Modified: Mar 20, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: unconditionally bump set->nelems before insertion

In case that the set is full, a new element gets published then removed
without waiting for the RCU grace period, while RCU reader can be
walking over it already.

To address this issue, add the element transaction even if set is full,
but toggle the set_full flag to report -ENFILE so the abort path safely
unwinds the set to its previous state.

As for element updates, decrement set->nelems to restore it.

A simpler fix is to call synchronize_rcu() in the error path.
However, with a large batch adding elements to already maxed-out set,
this could cause noticeable slowdown of such batches.

https://git.kernel.org/stable/c/6826131c7674329335ca25df2550163eb8a1fd0c
https://git.kernel.org/stable/c/ccb8c8f3c1127cf34d18c737309897c68046bf21
https://git.kernel.org/stable/c/def602e498a4f951da95c95b1b8ce8ae68aa733a