CVE-2026-23413
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-416
Utilización después de liberación
Fecha de publicación:
02/04/2026
Última modificación:
24/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
clsact: Fix use-after-free in init/destroy rollback asymmetry<br />
<br />
Fix a use-after-free in the clsact qdisc upon init/destroy rollback asymmetry.<br />
The latter is achieved by first fully initializing a clsact instance, and<br />
then in a second step having a replacement failure for the new clsact qdisc<br />
instance. clsact_init() initializes ingress first and then takes care of the<br />
egress part. This can fail midway, for example, via tcf_block_get_ext(). Upon<br />
failure, the kernel will trigger the clsact_destroy() callback.<br />
<br />
Commit 1cb6f0bae504 ("bpf: Fix too early release of tcx_entry") details the<br />
way how the transition is happening. If tcf_block_get_ext on the q->ingress_block<br />
ends up failing, we took the tcx_miniq_inc reference count on the ingress<br />
side, but not yet on the egress side. clsact_destroy() tests whether the<br />
{ingress,egress}_entry was non-NULL. However, even in midway failure on the<br />
replacement, both are in fact non-NULL with a valid egress_entry from the<br />
previous clsact instance.<br />
<br />
What we really need to test for is whether the qdisc instance-specific ingress<br />
or egress side previously got initialized. This adds a small helper for checking<br />
the miniq initialization called mini_qdisc_pair_inited, and utilizes that upon<br />
clsact_destroy() in order to fix the use-after-free scenario. Convert the<br />
ingress_destroy() side as well so both are consistent to each other.
Impacto
Puntuación base 3.x
7.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.41 (incluyendo) | 6.6.130 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9.10 (incluyendo) | 6.10 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.10.1 (incluyendo) | 6.12.78 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.20 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.10 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.10:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0509b762bc5e8ea7b8391130730c6d8502fc6e69
- https://git.kernel.org/stable/c/37bef86e5428d59f70a4da82b80f9a8f252fecbe
- https://git.kernel.org/stable/c/4c9af67f99aa3e51b522c54968ab3ac8272be41c
- https://git.kernel.org/stable/c/a0671125d4f55e1e98d9bde8a0b671941987e208
- https://git.kernel.org/stable/c/a73d95b57bf9faebdfed591bcb7ed9292062a84c



