CVE-2026-43060
Description
AI Translation Available
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_ct: drop pending enqueued packets on removal
Packets sitting in nfqueue might hold a reference to:
- templates that specify the conntrack zone, because a percpu area is
used and module removal is possible.
- conntrack timeout policies and helper, where object removal leave
a stale reference.
Since these objects can just go away, drop enqueued packets to avoid
stale reference to them.
If there is a need for finer grain removal, this logic can be revisited
to make selective packet drop upon dependencies.
https://git.kernel.org/stable/c/36eae0956f659e48d5366d9b083d9417f3263ddc
https://git.kernel.org/stable/c/3da0b946835f33bf36b459ead764c61a761e689b
https://git.kernel.org/stable/c/6802ff8beceb9c4254318e81c1395720438f2cc2
https://git.kernel.org/stable/c/77da55dee67720e2b8d2db49a53334e6c017ee7b
https://git.kernel.org/stable/c/8a64e76933672b08bd85b63086f33432070fd729
https://git.kernel.org/stable/c/ab50302190b303f847c4eba0e31a01a56dec596e
https://git.kernel.org/stable/c/e68a8db3a0546482b34e9ca5ca886bcf73eb37bb
https://git.kernel.org/stable/c/f29a055e4f593e577805b41228b142b58f48df1b