CVE-2026-23111

Source
https://cve.org/CVERecord?id=CVE-2026-23111
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23111.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23111
Downstream
Related
Published
2026-02-13T13:29:55.895Z
Modified
2026-03-29T17:44:17.078804353Z
Summary
netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nftables: fix inverted genmask check in nftmapcatchallactivate()

nftmapcatchallactivate() has an inverted element activity check compared to its non-catchall counterpart nftmapelem_activate() and compared to what is logically required.

nftmapcatchall_activate() is called from the abort path to re-activate catchall map elements that were deactivated during a failed transaction. It should skip elements that are already active (they don't need re-activation) and process elements that are inactive (they need to be restored). Instead, the current code does the opposite: it skips inactive elements and processes active ones.

Compare the non-catchall activate callback, which is correct:

nftmapelemactivate(): if (nftsetelem_active(ext, iter->genmask)) return 0; /* skip active, process inactive */

With the buggy catchall version:

nftmapcatchallactivate(): if (!nftsetelemactive(ext, genmask)) continue; /* skip inactive, process active */

The consequence is that when a DELSET operation is aborted, nftsetelemdataactivate() is never called for the catchall element. For NFTGOTO verdict elements, this means nftdatahold() is never called to restore the chain->use reference count. Each abort cycle permanently decrements chain->use. Once chain->use reaches zero, DELCHAIN succeeds and frees the chain while catchall verdict elements still reference it, resulting in a use-after-free.

This is exploitable for local privilege escalation from an unprivileged user via user namespaces + nftables on distributions that enable CONFIGUSERNS and CONFIGNFTABLES.

Fix by removing the negation so the check matches nftmapelemactivate(): skip active elements, process inactive ones.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23111.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
25aa2ad37c2162be1c0bc4fe6397f7e4c13f00f8
Fixed
8c760ba4e36c750379d13569f23f5a6e185333f5
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d60be2da67d172aecf866302c91ea11533eca4d9
Fixed
b9b6573421de51829f7ec1cce76d85f5f6fbbd7f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
628bd3e49cba1c066228e23d71a852c23e26da73
Fixed
42c574c1504aa089a0a142e4c13859327570473d
Fixed
1444ff890b4653add12f734ffeffc173d42862dd
Fixed
8b68a45f9722f2babe9e7bad00aa74638addf081
Fixed
f41c5d151078c5348271ffaf8e7410d96f2d82f8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
bc9f791d2593f17e39f87c6e2b3a36549a3705b1
Last affected
3c7ec098e3b588434a8b07ea9b5b36f04cef1f50
Last affected
a136b7942ad2a50de708f76ea299ccb45ac7a7f9
Last affected
dc7cdf8cbcbf8b13de1df93f356ec04cdeef5c41

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23111.json"