Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-23412
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-02 Apr, 2026 | 11:40
Updated At-11 May, 2026 | 22:06
Rejected At-
▼CVE Numbering Authority (CNA)
netfilter: bpf: defer hook memory release until rcu readers are done

In the Linux kernel, the following vulnerability has been resolved: netfilter: bpf: defer hook memory release until rcu readers are done Yiming Qian reports UaF when concurrent process is dumping hooks via nfnetlink_hooks: BUG: KASAN: slab-use-after-free in nfnl_hook_dump_one.isra.0+0xe71/0x10f0 Read of size 8 at addr ffff888003edbf88 by task poc/79 Call Trace: <TASK> nfnl_hook_dump_one.isra.0+0xe71/0x10f0 netlink_dump+0x554/0x12b0 nfnl_hook_get+0x176/0x230 [..] Defer release until after concurrent readers have completed.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/netfilter/nf_bpf_link.c
Default Status
unaffected
Versions
Affected
  • From 84601d6ee68ae820dec97450934797046d62db4b before d016c216bc75c45128160593a77b864a04dbe7c0 (git)
  • From 84601d6ee68ae820dec97450934797046d62db4b before cb2bf5efdb02a2a59faf603604a1066e8266f349 (git)
  • From 84601d6ee68ae820dec97450934797046d62db4b before c25e0dec366ae99b7264324ce3c7cbaea34691f9 (git)
  • From 84601d6ee68ae820dec97450934797046d62db4b before 54244d54a971c26a0cd0a9073460ff71f3c51b32 (git)
  • From 84601d6ee68ae820dec97450934797046d62db4b before 24f90fa3994b992d1a09003a3db2599330a5232a (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/netfilter/nf_bpf_link.c
Default Status
affected
Versions
Affected
  • 6.4
Unaffected
  • From 0 before 6.4 (semver)
  • From 6.6.130 through 6.6.* (semver)
  • From 6.12.78 through 6.12.* (semver)
  • From 6.18.20 through 6.18.* (semver)
  • From 6.19.10 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/d016c216bc75c45128160593a77b864a04dbe7c0
N/A
https://git.kernel.org/stable/c/cb2bf5efdb02a2a59faf603604a1066e8266f349
N/A
https://git.kernel.org/stable/c/c25e0dec366ae99b7264324ce3c7cbaea34691f9
N/A
https://git.kernel.org/stable/c/54244d54a971c26a0cd0a9073460ff71f3c51b32
N/A
https://git.kernel.org/stable/c/24f90fa3994b992d1a09003a3db2599330a5232a
N/A
Hyperlink: https://git.kernel.org/stable/c/d016c216bc75c45128160593a77b864a04dbe7c0
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cb2bf5efdb02a2a59faf603604a1066e8266f349
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c25e0dec366ae99b7264324ce3c7cbaea34691f9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/54244d54a971c26a0cd0a9073460ff71f3c51b32
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/24f90fa3994b992d1a09003a3db2599330a5232a
Resource: N/A
Details not found