CVE-2026-23458
Use-After-Free in Linux Kernel netfilter ctnetlink Dump Causes Crash
Publication date: 2026-04-03
Last updated on: 2026-04-27
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | 7.0.0-rc2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's netfilter component, specifically in the ctnetlink module. The function ctnetlink_dump_exp_ct() improperly manages a connection tracking pointer by storing it for a netlink dump callback but releasing its reference too early. When the dump operation spans multiple rounds, the callback attempts to access the now-freed connection tracking data, leading to a use-after-free condition.
The root cause is that the netlink_dump_control structure lacks proper start and done callbacks to manage the lifetime of the connection tracking reference across multiple dump rounds. Other similar functions correctly use these callbacks to hold and release references. The fix involves adding these callbacks and adjusting the code to avoid dereferencing freed memory.
How can this vulnerability impact me? :
This use-after-free vulnerability can lead to memory corruption in the Linux kernel, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code with kernel privileges. Exploiting this flaw could compromise the security and reliability of systems running vulnerable Linux kernel versions.