<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Lpe on Aretiq AI</title><link>https://aretiq.ai/tags/lpe/</link><description>Recent content in Lpe on Aretiq AI</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 18 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://aretiq.ai/tags/lpe/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-23412 — Linux Kernel Netfilter BPF Hook Use-After-Free LPE</title><link>https://aretiq.ai/research/vul260518-cve-2026-23412-linux-kernel-netfilter-bpf-hook-use-after-free-lpe/</link><pubDate>Mon, 18 May 2026 00:00:00 +0000</pubDate><guid>https://aretiq.ai/research/vul260518-cve-2026-23412-linux-kernel-netfilter-bpf-hook-use-after-free-lpe/</guid><description>&lt;h2 id="1-overview">1. Overview&lt;/h2>
&lt;p>A use-after-free vulnerability exists in the Linux kernel&amp;rsquo;s BPF netfilter link implementation. The &lt;code>bpf_nf_link_lops&lt;/code> operations structure uses synchronous deallocation (&lt;code>.dealloc&lt;/code>) instead of RCU-deferred freeing (&lt;code>.dealloc_deferred&lt;/code>), allowing a use-after-free when concurrent hook enumeration via nfnetlink races with BPF link destruction. The UAF on the kmalloc-192 slab cache is exploitable for local privilege escalation through heap spray and function pointer hijacking. The Linux kernel community addressed this vulnerability in kernel version 7.0-rc5.&lt;/p></description></item></channel></rss>