CVE-2026-23385
Memory Allocation Failure in Linux Kernel nf_tables Causes WARN Crash
Publication date: 2026-03-25
Last updated on: 2026-04-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.10 |
| linux | linux_kernel | From 6.19 (inc) to 6.19.7 (exc) |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.10.1 (inc) to 6.18.17 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's netfilter nf_tables component. It involves improper handling of set cloning during the flush operation. Specifically, a memory allocation failure with GFP_KERNEL leads to a kernel warning (WARN splat) in the nft_map_deactivate function. The issue arises because the set cloning was not properly restricted to the flush set command in the preparation phase, causing potential instability or crashes.
The fix restricts set cloning to only occur during the flush set command by introducing a new iteration type NFT_ITER_UPDATE_CLONE. This ensures that sets are cloned only when necessary, preventing cloning of sets that are being deleted and avoiding the problematic memory allocation failure.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to emit warnings and potentially crash or become unstable due to failed memory allocations during netfilter operations. Such instability can lead to denial of service conditions on affected systems, impacting availability and reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a WARN splat in the Linux kernel logs related to netfilter nf_tables, specifically at nft_map_deactivate in nf_tables_api.c. Detection involves monitoring kernel logs for warning messages indicating memory allocation failures or WARN splats in the nf_tables subsystem.
You can check your system logs for such warnings using commands like:
- dmesg | grep -i 'nf_tables_api.c:845'
- journalctl -k | grep -i 'nf_tables_api.c:845'
- grep -i 'WARNING: net/netfilter/nf_tables_api.c' /var/log/kern.log
These commands help identify the specific warning related to the vulnerability in kernel logs.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by restricting the cloning of sets to the flush set command in the preparation phase and updating the nf_tables backends to handle cloning appropriately.
Immediate mitigation steps include:
- Update your Linux kernel to a version that includes the fix for this vulnerability.
- Avoid using or triggering nf_tables operations that involve set cloning until the patch is applied.
- Monitor kernel logs for related warnings to detect any exploitation attempts.