CVE-2026-23340
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
25/03/2026
Last modified:
23/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: sched: avoid qdisc_reset_all_tx_gt() vs dequeue race for lockless qdiscs<br />
<br />
When shrinking the number of real tx queues,<br />
netif_set_real_num_tx_queues() calls qdisc_reset_all_tx_gt() to flush<br />
qdiscs for queues which will no longer be used.<br />
<br />
qdisc_reset_all_tx_gt() currently serializes qdisc_reset() with<br />
qdisc_lock(). However, for lockless qdiscs, the dequeue path is<br />
serialized by qdisc_run_begin/end() using qdisc->seqlock instead, so<br />
qdisc_reset() can run concurrently with __qdisc_run() and free skbs<br />
while they are still being dequeued, leading to UAF.<br />
<br />
This can easily be reproduced on e.g. virtio-net by imposing heavy<br />
traffic while frequently changing the number of queue pairs:<br />
<br />
iperf3 -ub0 -c $peer -t 0 &<br />
while :; do<br />
ethtool -L eth0 combined 1<br />
ethtool -L eth0 combined 2<br />
done<br />
<br />
With KASAN enabled, this leads to reports like:<br />
<br />
BUG: KASAN: slab-use-after-free in __qdisc_run+0x133f/0x1760<br />
...<br />
Call Trace:<br />
<br />
...<br />
__qdisc_run+0x133f/0x1760<br />
__dev_queue_xmit+0x248f/0x3550<br />
ip_finish_output2+0xa42/0x2110<br />
ip_output+0x1a7/0x410<br />
ip_send_skb+0x2e6/0x480<br />
udp_send_skb+0xb0a/0x1590<br />
udp_sendmsg+0x13c9/0x1fc0<br />
...<br />
<br />
<br />
Allocated by task 1270 on cpu 5 at 44.558414s:<br />
...<br />
alloc_skb_with_frags+0x84/0x7c0<br />
sock_alloc_send_pskb+0x69a/0x830<br />
__ip_append_data+0x1b86/0x48c0<br />
ip_make_skb+0x1e8/0x2b0<br />
udp_sendmsg+0x13a6/0x1fc0<br />
...<br />
<br />
Freed by task 1306 on cpu 3 at 44.558445s:<br />
...<br />
kmem_cache_free+0x117/0x5e0<br />
pfifo_fast_reset+0x14d/0x580<br />
qdisc_reset+0x9e/0x5f0<br />
netif_set_real_num_tx_queues+0x303/0x840<br />
virtnet_set_channels+0x1bf/0x260 [virtio_net]<br />
ethnl_set_channels+0x684/0xae0<br />
ethnl_default_set_doit+0x31a/0x890<br />
...<br />
<br />
Serialize qdisc_reset_all_tx_gt() against the lockless dequeue path by<br />
taking qdisc->seqlock for TCQ_F_NOLOCK qdiscs, matching the<br />
serialization model already used by dev_reset_queue().<br />
<br />
Additionally clear QDISC_STATE_NON_EMPTY after reset so the qdisc state<br />
reflects an empty queue, avoiding needless re-scheduling.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.16.1 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.167 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.130 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.77 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:4.16:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/5bb27ad54d12de67e457d7d251198e361bef835e
- https://git.kernel.org/stable/c/5bc4e69306ed7ae02232eb4c0b23ed621a26d504
- https://git.kernel.org/stable/c/7594467c49bfc2f4644dee0415ac2290db11fa0d
- https://git.kernel.org/stable/c/7f083faf59d14c04e01ec05a7507f036c965acf8
- https://git.kernel.org/stable/c/8314944cc3bdeaa5a73e6f8a8cf0d94822e625cb
- https://git.kernel.org/stable/c/c69df4e0524f8de8e176ba389acd83e85f5f49d0
- https://git.kernel.org/stable/c/dbd58b0730aa06ab6ad26079cf9a5b6b58e7e750



