SB20260325120 - Use After Free in Linux kernel net
Published: March 25, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use After Free (CVE-ID: CVE-2026-23340)
The vulnerability allows a local user to execute arbitrary code or cause a denial of service.
The vulnerability exists due to a use-after-free in the network scheduler (qdisc) component when resetting transmit queues for lockless qdiscs during changes in the number of real transmit queues. A local user can trigger a race condition between qdisc_reset() and the packet dequeue path, leading to use-after-free and potential execution of arbitrary code or system crash.
Exploitation requires the ability to modify network interface queue configurations, which typically requires local user privileges. The issue affects systems using lockless qdiscs such as pfifo_fast, especially under high network load and frequent queue resizing operations.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/5bc4e69306ed7ae02232eb4c0b23ed621a26d504
- https://git.kernel.org/stable/c/7594467c49bfc2f4644dee0415ac2290db11fa0d
- https://git.kernel.org/stable/c/7f083faf59d14c04e01ec05a7507f036c965acf8
- https://git.kernel.org/stable/c/8314944cc3bdeaa5a73e6f8a8cf0d94822e625cb
- https://git.kernel.org/stable/c/c69df4e0524f8de8e176ba389acd83e85f5f49d0
- https://git.kernel.org/stable/c/dbd58b0730aa06ab6ad26079cf9a5b6b58e7e750