SB2026040671 - Use-after-free in Linux kernel netfilter
Published: April 6, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2026-23458)
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to use-after-free in ctnetlink_dump_exp_ct() and ctnetlink_exp_ct_dump_table() when handling multi-round netlink dump requests. A local user can trigger a netlink dump that spans multiple recvmsg() calls to cause a denial of service.
The issue occurs because a conntrack pointer stored in callback data is dereferenced after its reference is dropped, and the second dump round can access the freed object via nfct_help(ct). The proof of concept shows a slab-use-after-free read detected by KASAN.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/04c8907ce4e3d3e26c5e1a3e47aa5d17082cbb56
- https://git.kernel.org/stable/c/5cb81eeda909dbb2def209dd10636b51549a3f8a
- https://git.kernel.org/stable/c/bdf2724eefd4455a66863abb025bab8d3aa98c57
- https://git.kernel.org/stable/c/cd541f15b60e2257441398cf495d978f816d09f8
- https://git.kernel.org/stable/c/f025171feef2ac65663d7986f1d5ff0c28d6b2a9
- https://git.kernel.org/stable/c/f04cc86d59906513d2d62183b882966fc0ae0390