{
  "affected": [
    {
      "ranges": [
        {
          "events": [
            {
              "introduced": "3c4287f62044a90e73a561aa05fc46e62da173da"
            },
            {
              "fixed": "16f3595c0441d87dfa005c47d8f95be213afaa9e"
            },
            {
              "fixed": "7864c667aed01a58b87ca518a631322cd0ac34c0"
            },
            {
              "fixed": "c12d570d71920903a1a0468b7d13b085203d0c93"
            },
            {
              "fixed": "500a50a301ce962b019ab95053ac70264fec2c21"
            },
            {
              "fixed": "aff13667708dfa0dce136b8efd81baa9fa6ef261"
            },
            {
              "fixed": "9df95785d3d8302f7c066050117b04cd3c2048c2"
            }
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "type": "GIT"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "Linux",
        "name": "Kernel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "5.6.0"
            },
            {
              "fixed": "6.1.167"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "6.2.0"
            },
            {
              "fixed": "6.6.130"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "6.7.0"
            },
            {
              "fixed": "6.12.77"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "6.13.0"
            },
            {
              "fixed": "6.18.17"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "6.19.0"
            },
            {
              "fixed": "6.19.7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "database_specific": {
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23351.json"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: split gc into unlink and reclaim phase\n\nYiming Qian reports Use-after-free in the pipapo set type:\n  Under a large number of expired elements, commit-time GC can run for a very\n  long time in a non-preemptible context, triggering soft lockup warnings and\n  RCU stall reports (local denial of service).\n\nWe must split GC in an unlink and a reclaim phase.\n\nWe cannot queue elements for freeing until pointers have been swapped.\nExpired elements are still exposed to both the packet path and userspace\ndumpers via the live copy of the data structure.\n\ncall_rcu() does not protect us: dump operations or element lookups starting\nafter call_rcu has fired can still observe the free'd element, unless the\ncommit phase has made enough progress to swap the clone and live pointers\nbefore any new reader has picked up the old version.\n\nThis a similar approach as done recently for the rbtree backend in commit\n35f83a75529a (\"netfilter: nft_set_rbtree: don't gc elements on insert\").",
  "id": "CVE-2026-23351",
  "modified": "2026-04-01T23:09:18.498761430Z",
  "published": "2026-03-25T10:27:36.854Z",
  "references": [
    {
      "type": "PACKAGE",
      "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/16f3595c0441d87dfa005c47d8f95be213afaa9e"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/500a50a301ce962b019ab95053ac70264fec2c21"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/7864c667aed01a58b87ca518a631322cd0ac34c0"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/9df95785d3d8302f7c066050117b04cd3c2048c2"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/aff13667708dfa0dce136b8efd81baa9fa6ef261"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/c12d570d71920903a1a0468b7d13b085203d0c93"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23351.json"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23351"
    }
  ],
  "schema_version": "1.7.3",
  "summary": "netfilter: nft_set_pipapo: split gc into unlink and reclaim phase"
}