CVE-2026-23274 PUBLISHED

netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels

Assigner: Linux
Reserved: 13.01.2026 Published: 20.03.2026 Updated: 20.03.2026

In the Linux kernel, the following vulnerability has been resolved:

netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels

IDLETIMER revision 0 rules reuse existing timers by label and always call mod_timer() on timer->timer.

If the label was created first by revision 1 with XT_IDLETIMER_ALARM, the object uses alarm timer semantics and timer->timer is never initialized. Reusing that object from revision 0 causes mod_timer() on an uninitialized timer_list, triggering debugobjects warnings and possible panic when panic_on_warn=1.

Fix this by rejecting revision 0 rule insertion when an existing timer with the same label is of ALARM type.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 68983a354a655c35d3fb204489d383a2a051fda7 to f5ef97c13165542480a6ffdbe6f09f40bbb7cbf1 (excl.)
  • affected from 68983a354a655c35d3fb204489d383a2a051fda7 to f228b9ae2a7e84d1153616d8e71c4236cb1f1309 (excl.)
  • affected from 68983a354a655c35d3fb204489d383a2a051fda7 to 329f0b9b48ee6ab59d1ab72fef55fe8c6463a6cf (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 5.7 is affected
  • unaffected from 0 to 5.7 (excl.)
  • unaffected from 6.18.19 to 6.18.* (incl.)
  • unaffected from 6.19.9 to 6.19.* (incl.)
  • unaffected from 7.0-rc4 to * (incl.)

References