Linux Kernel nf_tables: memleak in nft_dynset stateful expr cloning
CVE-2026-23399 Published on March 28, 2026
nf_tables: nft_dynset: fix possible stateful expression memleak in error path
In the Linux kernel, the following vulnerability has been resolved:
nf_tables: nft_dynset: fix possible stateful expression memleak in error path
If cloning the second stateful expression in the element via GFP_ATOMIC
fails, then the first stateful expression remains in place without being
released.
unreferenced object (percpu) 0x607b97e9cab8 (size 16):
comm "softirq", pid 0, jiffies 4294931867
hex dump (first 16 bytes on cpu 3):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
backtrace (crc 0):
pcpu_alloc_noprof+0x453/0xd80
nft_counter_clone+0x9c/0x190 [nf_tables]
nft_expr_clone+0x8f/0x1b0 [nf_tables]
nft_dynset_new+0x2cb/0x5f0 [nf_tables]
nft_rhash_update+0x236/0x11c0 [nf_tables]
nft_dynset_eval+0x11f/0x670 [nf_tables]
nft_do_chain+0x253/0x1700 [nf_tables]
nft_do_chain_ipv4+0x18d/0x270 [nf_tables]
nf_hook_slow+0xaa/0x1e0
ip_local_deliver+0x209/0x330
Products Associated with CVE-2026-23399
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version 563125a73ac30d7036ae69ca35c40500562c1de4 and below d1354873cbe3b344899c4311ac05897fd83e3f21 is affected.
- Version 563125a73ac30d7036ae69ca35c40500562c1de4 and below 31641c682db73353e4647e40735c7f2a75ff58ef is affected.
- Version 563125a73ac30d7036ae69ca35c40500562c1de4 and below c88a9fd26cee365bec932196f76175772a941cca is affected.
- Version 563125a73ac30d7036ae69ca35c40500562c1de4 and below 0548a13b5a145b16e4da0628b5936baf35f51b43 is affected.
- Version 5.11 is affected.
- Before 5.11 is unaffected.
- Version 6.12.78, <= 6.12.* is unaffected.
- Version 6.18.20, <= 6.18.* is unaffected.
- Version 6.19.10, <= 6.19.* is unaffected.
- Version 7.0-rc5, <= * is unaffected.