CVE-2026-23272 — Time-of-check Time-of-use (TOCTOU) Race Condition in Linux
Severity
7.8HIGHNVD
EPSS
0.0%
top 97.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 20
Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: unconditionally bump set->nelems before insertion
In case that the set is full, a new element gets published then removed
without waiting for the RCU grace period, while RCU reader can be
walking over it already.
To address this issue, add the element transaction even if set is full,
but toggle the set_full flag to report -ENFILE so the abort path safely
unwinds the set to its previous state.
As for ele…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages3 packages
▶CVEListV5linux/linux35d0ac9070ef619e3bf44324375878a1c540387b — 6826131c7674329335ca25df2550163eb8a1fd0c+4
🔴Vulnerability Details
4OSV▶
CVE-2026-23272: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: unconditionally bump set->nelems before insertion In case th↗2026-03-20
GHSA▶
GHSA-qhvv-4mw5-pxh3: In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: unconditionally bump set->nelems before insertion
In case↗2026-03-20
📋Vendor Advisories
3Debian▶
CVE-2026-23272: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...↗2026