Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1518 articles · 106541 vulns · 38/55 feeds (7d)
← Back to list
—
CVE-2026-23392

netfilter: nf_tables: release flowtable after rcu grace period on error

Description

A vulnerability marked as critical has been reported in Linux Kernel up to 7.0-rc4. Impacted is the function synchronize_rcu of the component nf_tables. The manipulation leads to use after free. This vulnerability is referenced as CVE-2026-23392. The attack needs to be initiated within the local network. No exploit is available. It is suggested to upgrade the affected component.

Affected Products

VendorProductVersions
LinuxLinux3b49e2e94e6ebb8b23d0955d9e898254455734f8, 3b49e2e94e6ebb8b23d0955d9e898254455734f8, 3b49e2e94e6ebb8b23d0955d9e898254455734f8, 3b49e2e94e6ebb8b23d0955d9e898254455734f8, 3b49e2e94e6ebb8b23d0955d9e898254455734f8, 3b49e2e94e6ebb8b23d0955d9e898254455734f8, 4.16, 7.0-rc4

References

  • https://git.kernel.org/stable/c/d2632de96ccb066e0131ad1494241b9c281c60b8
  • https://git.kernel.org/stable/c/adee3436ccd29f1e514c028899e400cbc6d84065
  • https://git.kernel.org/stable/c/7e3955b282eae20d61c75e499c75eade51c20060
  • https://git.kernel.org/stable/c/c8092edb9a11f20f95ccceeb9422b7dd0df337bd
  • https://git.kernel.org/stable/c/e78a2dcc7cfb87b64a631441ca7681492b347ef6
  • https://git.kernel.org/stable/c/d73f4b53aaaea4c95f245e491aa5eeb8a21874ce

Related News (2 articles)

Tier C
VulDB4h ago
CVE-2026-23392 | Linux Kernel up to 7.0-rc4 nf_tables synchronize_rcu use after free
→ No new info (linked only)
Tier C
Linux Kernel CVEs6h ago
CVE-2026-23392: netfilter: nf_tables: release flowtable after rcu grace period on error
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Published3/25/2026
Last enriched3h agov2
Trending Score50
Source articles2
Independent2
Info Completeness6/14
Missing: cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Version History

v2
Last enriched 3h ago
v2Tier C3h ago

Updated description with critical severity, added affected version 7.0-rc4, and noted that no exploit is available.

descriptionaffectedVersionsseverityactivelyExploited
via VulDB
v16h ago

Initial creation