CVE-2026-23436
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/04/2026
Last modified:
23/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: shaper: protect from late creation of hierarchy<br />
<br />
We look up a netdev during prep of Netlink ops (pre- callbacks)<br />
and take a ref to it. Then later in the body of the callback<br />
we take its lock or RCU which are the actual protections.<br />
<br />
The netdev may get unregistered in between the time we take<br />
the ref and the time we lock it. We may allocate the hierarchy<br />
after flush has already run, which would lead to a leak.<br />
<br />
Take the instance lock in pre- already, this saves us from the race<br />
and removes the need for dedicated lock/unlock callbacks completely.<br />
After all, if there&#39;s any chance of write happening concurrently<br />
with the flush - we&#39;re back to leaking the hierarchy.<br />
<br />
We may take the lock for devices which don&#39;t support shapers but<br />
we&#39;re only dealing with SET operations here, not taking the lock<br />
would be optimizing for an error case.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13.1 (including) | 6.18.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



