Bug 2449571 (CVE-2026-23272) - CVE-2026-23272 kernel: netfilter: nf_tables: unconditionally bump set->nelems before insertion
Summary: CVE-2026-23272 kernel: netfilter: nf_tables: unconditionally bump set->nelems...
Keywords:
Status: NEW
Alias: CVE-2026-23272
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-20 09:03 UTC by OSIDB Bzimport
Modified: 2026-03-20 12:18 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-20 09:03:19 UTC
In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: unconditionally bump set->nelems before insertion

In case that the set is full, a new element gets published then removed
without waiting for the RCU grace period, while RCU reader can be
walking over it already.

To address this issue, add the element transaction even if set is full,
but toggle the set_full flag to report -ENFILE so the abort path safely
unwinds the set to its previous state.

As for element updates, decrement set->nelems to restore it.

A simpler fix is to call synchronize_rcu() in the error path.
However, with a large batch adding elements to already maxed-out set,
this could cause noticeable slowdown of such batches.


Note You need to log in before you can comment on or make changes to this bug.