SB2026032555 - Resource exhaustion in Linux kernel netfilter
Published: March 25, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Resource exhaustion (CVE-ID: CVE-2026-23391)
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper resource management in the netfilter xt_CT module when handling packet queueing. A local user can trigger the queuing of packets that reference templates, which, upon removal of the template, are not properly flushed, leading to resource exhaustion and system instability.
Templates such as connection tracking helpers or timeout policies may be removed during module unloading or via nfnetlink_cttimeout, leaving packets enqueued without valid references.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/19a230dec6bb8928e3f96387f9085cf2c79bcef9
- https://git.kernel.org/stable/c/63b8097cea1923fe82cd598068d0796da8c015ec
- https://git.kernel.org/stable/c/777d02efe3d630cca4c1b63962cec17c57711325
- https://git.kernel.org/stable/c/cb549925875fa06dd155e49db4ac2c5044c30f9c
- https://git.kernel.org/stable/c/d2d0bae0c9a2a17b6990a2966f5cdce0813d6256
- https://git.kernel.org/stable/c/f62a218a946b19bb59abdd5361da85fa4606b96b