CVE-2026-23399

In the Linux kernel, the following vulnerability has been resolved:

nf_tables: nft_dynset: fix possible stateful expression memleak in error path

If cloning the second stateful expression in the element via GFP_ATOMIC
fails, then the first stateful expression remains in place without being
released.

  unreferenced object (percpu) 0x607b97e9cab8 (size 16):
    comm “softirq”, pid 0, jiffies 4294931867
    hex dump (first 16 bytes on cpu 3):
      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    backtrace (crc 0):
      pcpu_alloc_noprof+0x453/0xd80
      nft_counter_clone+0x9c/0x190 [nf_tables]
      nft_expr_clone+0x8f/0x1b0 [nf_tables]
      nft_dynset_new+0x2cb/0x5f0 [nf_tables]
      nft_rhash_update+0x236/0x11c0 [nf_tables]
      nft_dynset_eval+0x11f/0x670 [nf_tables]
      nft_do_chain+0x253/0x1700 [nf_tables]
      nft_do_chain_ipv4+0x18d/0x270 [nf_tables]
      nf_hook_slow+0xaa/0x1e0
      ip_local_deliver+0x209/0x330

More information : https://git.kernel.org/stable/c/0548a13b5a145b16e4da0628b5936baf35f51b43