Description
In the Linux kernel, the following vulnerability has been resolved:

net: shaper: protect from late creation of hierarchy

We look up a netdev during prep of Netlink ops (pre- callbacks)
and take a ref to it. Then later in the body of the callback
we take its lock or RCU which are the actual protections.

The netdev may get unregistered in between the time we take
the ref and the time we lock it. We may allocate the hierarchy
after flush has already run, which would lead to a leak.

Take the instance lock in pre- already, this saves us from the race
and removes the need for dedicated lock/unlock callbacks completely.
After all, if there's any chance of write happening concurrently
with the flush - we're back to leaking the hierarchy.

We may take the lock for devices which don't support shapers but
we're only dealing with SET operations here, not taking the lock
would be optimizing for an error case.
Published: 2026-04-03
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Resource Leak
Action: Patch
AI Analysis

Impact

The kernel networking shaper module can lose a reference to a net device between obtaining a reference and acquiring its lock, allowing a hierarchy to be created after the device has been unregistered. This race can leave the hierarchy allocated without a valid device, resulting in a lingering allocation that is never cleaned up.

Affected Systems

The vulnerability affects any Linux kernel that implements the shaper subsystem and has not incorporated the fix contained in commit 719f6784f918f9e32f3ff3b197f900e852223f9d (and the associated subsequent commits). No specific kernel releases are enumerated in the vulnerability data, so all kernels prior to the inclusion of this patch are potentially affected.

Risk and Exploitability

The CVSS score and EPSS metric are not supplied in the vulnerability report, and the issue is not listed in CISA’s KEV catalog, so the severity and likelihood of exploitation are not quantified. The patch addresses the race condition, and no explicit attack vector is documented in the payload; therefore it cannot be determined from the data whether the flaw requires local or privileged access.

Generated by OpenCVE AI on April 3, 2026 at 18:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel update that incorporates commit 719f6784f918f9e32f3ff3b197f900e852223f9d or newer.
  • Verify the applied kernel release includes the patch by checking the commit hash or reviewing the kernel source.
  • If an update is not available, monitor for future kernel releases and apply the patch as soon as it is released.

Generated by OpenCVE AI on April 3, 2026 at 18:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-367
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362
CWE-399

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: shaper: protect from late creation of hierarchy We look up a netdev during prep of Netlink ops (pre- callbacks) and take a ref to it. Then later in the body of the callback we take its lock or RCU which are the actual protections. The netdev may get unregistered in between the time we take the ref and the time we lock it. We may allocate the hierarchy after flush has already run, which would lead to a leak. Take the instance lock in pre- already, this saves us from the race and removes the need for dedicated lock/unlock callbacks completely. After all, if there's any chance of write happening concurrently with the flush - we're back to leaking the hierarchy. We may take the lock for devices which don't support shapers but we're only dealing with SET operations here, not taking the lock would be optimizing for an error case.
Title net: shaper: protect from late creation of hierarchy
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:21.280Z

Reserved: 2026-01-13T15:37:46.017Z

Link: CVE-2026-23436

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:25.257

Modified: 2026-04-03T16:16:25.257

Link: CVE-2026-23436

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23436 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:16:15Z

Weaknesses