CVE-2026-23392Expired Pointer Dereference in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release flowtable after rcu grace period on error Call synchronize_rcu() after unregistering the hooks from error path, since a hook that already refers to this flowtable can be already registered, exposing this flowtable to packet path and nfnetlink_hook control plane. This error path is rare, it should only happen by reaching the maximum number hooks or by failing to set up to hardware offload, just ca

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Linuxlinux/linux_kernel4.16.06.1.167+4
Debianlinux/linux_kernel< 6.19.10-1
CVEListV5linux/linux3b49e2e94e6ebb8b23d0955d9e898254455734f8d2632de96ccb066e0131ad1494241b9c281c60b8+6
debiandebian/linux< linux 6.19.10-1 (forky)

🔴Vulnerability Details

3
GHSA
GHSA-f5vj-m443-mgw6: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release flowtable after rcu grace period on error Call syn2026-03-25
OSV
CVE-2026-23392: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release flowtable after rcu grace period on error Call synch2026-03-25
OSV
netfilter: nf_tables: release flowtable after rcu grace period on error2026-03-25

📋Vendor Advisories

3
Red Hat
kernel: netfilter: nf_tables: release flowtable after rcu grace period on error2026-03-25
Microsoft
netfilter: nf_tables: release flowtable after rcu grace period on error2026-03-10
Debian
CVE-2026-23392: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...2026

🕵️Threat Intelligence

59
Wiz
CVE-2025-68476 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-23356 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-1801 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-2303 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-23266 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23392 — Expired Pointer Dereference in Linux | cvebase