SB2026040316 - Use-after-free in Linux kernel sched



SB2026040316 - Use-after-free in Linux kernel sched

Published: April 3, 2026

Security Bulletin ID SB2026040316
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use-after-free (CVE-ID: CVE-2026-23413)

The vulnerability allows a local attacker to cause a denial of service.

The vulnerability exists due to use-after-free in the clsact qdisc when handling init and destroy rollback after a replacement failure. A local attacker can trigger a replacement failure during clsact initialization to cause a denial of service.

The issue occurs because ingress may be initialized before egress initialization fails, after which destroy logic can operate on stale state from the previous clsact instance.


Remediation

Install update from vendor's website.