{
  "affected": [
    {
      "ecosystem_specific": {
        "urgency": "not yet assigned"
      },
      "package": {
        "ecosystem": "Debian:13",
        "name": "linux"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "ecosystem_specific": {
        "urgency": "not yet assigned"
      },
      "package": {
        "ecosystem": "Debian:14",
        "name": "linux"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "6.19.10-1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "In the Linux kernel, the following vulnerability has been resolved:  netfilter: bpf: defer hook memory release until rcu readers are done  Yiming Qian reports UaF when concurrent process is dumping hooks via nfnetlink_hooks:  BUG: KASAN: slab-use-after-free in nfnl_hook_dump_one.isra.0+0xe71/0x10f0 Read of size 8 at addr ffff888003edbf88 by task poc/79 Call Trace:  \u003cTASK\u003e  nfnl_hook_dump_one.isra.0+0xe71/0x10f0  netlink_dump+0x554/0x12b0  nfnl_hook_get+0x176/0x230  [..]  Defer release until after concurrent readers have completed.",
  "id": "DEBIAN-CVE-2026-23412",
  "modified": "2026-04-03T09:48:26.914448206Z",
  "published": "2026-04-02T12:16:20.270Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://security-tracker.debian.org/tracker/CVE-2026-23412"
    }
  ],
  "upstream": [
    "CVE-2026-23412"
  ]
}