Description
In the Linux kernel, the following vulnerability has been resolved:

netfilter: xt_CT: drop pending enqueued packets on template removal

Templates refer to objects that can go away while packets are sitting in
nfqueue refer to:

- helper, this can be an issue on module removal.
- timeout policy, nfnetlink_cttimeout might remove it.

The use of templates with zone and event cache filter are safe, since
this just copies values.

Flush these enqueued packets in case the template rule gets removed.
Published: 2026-03-25
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

In the Linux kernel’s netfilter xt_CT module, templates used by zone and event cache filters can be removed while packets are queued. This causes pending enqueued packets to be dropped, which can result in significant packet loss and may lead to denial of service. The weakness is a resource management flaw, classified as CWE–911.

Affected Systems

Affected systems include all Linux kernel distributions that use the netfilter xt_CT module. Vendor information lists Linux:Linux, and no specific version numbers are provided in the official data.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.8, indicating moderate to high severity. The EPSS score is less than 1 %, suggesting a low likelihood of exploitation, and it is not listed in the CISA KEV catalog. Exploitation would require the ability to manipulate the kernel’s netfilter templates—such as by unloading helper modules or triggering nfnetlink_cttimeout to remove them—while traffic is being processed, which implies privileged access to the operating system.

Generated by OpenCVE AI on April 2, 2026 at 16:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a patched release that incorporates the xt_CT module fix.
  • Verify that no helper modules or nfnetlink_cttimeout operations are removing netfilter templates while traffic is active.
  • Monitor system logs for netfilter packet drop events that may indicate improper template removal.

Generated by OpenCVE AI on April 2, 2026 at 16:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 09:15:00 +0000


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-911
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_CT: drop pending enqueued packets on template removal Templates refer to objects that can go away while packets are sitting in nfqueue refer to: - helper, this can be an issue on module removal. - timeout policy, nfnetlink_cttimeout might remove it. The use of templates with zone and event cache filter are safe, since this just copies values. Flush these enqueued packets in case the template rule gets removed.
Title netfilter: xt_CT: drop pending enqueued packets on template removal
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-18T08:58:26.823Z

Reserved: 2026-01-13T15:37:46.009Z

Link: CVE-2026-23391

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T11:16:39.707

Modified: 2026-04-18T09:16:23.143

Link: CVE-2026-23391

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23391 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:22:59Z

Weaknesses