{"id":"CVE-2026-23278","summary":"netfilter: nf_tables: always walk all pending catchall elements","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: always walk all pending catchall elements\n\nDuring transaction processing we might have more than one catchall element:\n1 live catchall element and 1 pending element that is coming as part of the\nnew batch.\n\nIf the map holding the catchall elements is also going away, its\nrequired to toggle all catchall elements and not just the first viable\ncandidate.\n\nOtherwise, we get:\n WARNING: ./include/net/netfilter/nf_tables.h:1281 at nft_data_release+0xb7/0xe0 [nf_tables], CPU#2: nft/1404\n RIP: 0010:nft_data_release+0xb7/0xe0 [nf_tables]\n [..]\n __nft_set_elem_destroy+0x106/0x380 [nf_tables]\n nf_tables_abort_release+0x348/0x8d0 [nf_tables]\n nf_tables_abort+0xcf2/0x3ac0 [nf_tables]\n nfnetlink_rcv_batch+0x9c9/0x20e0 [..]","modified":"2026-04-02T13:12:19.958840Z","published":"2026-03-20T08:08:58.566Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23278.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/77c26b5056d693ffe5e9f040e946251cdb55ae55"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7cb9a23d7ae40a702577d3d8bacb7026f04ac2a9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/de47a88c6b807910f05703fb6605f7efdaa11417"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eb0948fa13298212c5f8b30ee48efdae4389ab09"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23278.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23278"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"628bd3e49cba1c066228e23d71a852c23e26da73"},{"fixed":"eb0948fa13298212c5f8b30ee48efdae4389ab09"},{"fixed":"de47a88c6b807910f05703fb6605f7efdaa11417"},{"fixed":"77c26b5056d693ffe5e9f040e946251cdb55ae55"},{"fixed":"7cb9a23d7ae40a702577d3d8bacb7026f04ac2a9"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"bc9f791d2593f17e39f87c6e2b3a36549a3705b1"},{"last_affected":"3c7ec098e3b588434a8b07ea9b5b36f04cef1f50"},{"last_affected":"a136b7942ad2a50de708f76ea299ccb45ac7a7f9"},{"last_affected":"25aa2ad37c2162be1c0bc4fe6397f7e4c13f00f8"},{"last_affected":"d60be2da67d172aecf866302c91ea11533eca4d9"},{"last_affected":"dc7cdf8cbcbf8b13de1df93f356ec04cdeef5c41"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23278.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"6.4.0"},{"fixed":"6.12.78"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.19"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.9"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23278.json"}}],"schema_version":"1.7.5"}