Description
In the Linux kernel, the following vulnerability has been resolved:

net-shapers: don't free reply skb after genlmsg_reply()

genlmsg_reply() hands the reply skb to netlink, and
netlink_unicast() consumes it on all return paths, whether the
skb is queued successfully or freed on an error path.

net_shaper_nl_get_doit() and net_shaper_nl_cap_get_doit()
currently jump to free_msg after genlmsg_reply() fails and call
nlmsg_free(msg), which can hit the same skb twice.

Return the genlmsg_reply() error directly and keep free_msg
only for pre-reply failures.
Published: 2026-05-13
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the Linux kernel’s net-shapers implementation causes a double free of a socket buffer after a genlmsg_reply call fails. The duplicated free can corrupt kernel memory, potentially leading to a kernel panic or arbitrary code execution if an attacker can trigger the failure path. Thus, the primary impact is disruption of system availability or possible local privilege escalation on a vulnerable host.

Affected Systems

The vulnerability affects the Linux kernel, specifically the net-shapers code path that handles netlink replies. All kernel versions that contain the problematic net_shapers logic and have not yet incorporated the recent patch (identified by commit 57885276cc16a2e2b76282c808a4e84cbecb3aae) are susceptible. No specific version numbers are listed, so the risk applies to any Linux kernel running an unpatched net_shapers implementation.

Risk and Exploitability

The CVSS score of 7.0 indicates a high severity vulnerability. EPSS is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting no confirmed exploits yet. The likely attack vector is local: an attacker with privileges to send crafted netlink messages to the kernel can invoke the buggy path. Due to the lack of publicly reported exploits, the risk is moderate to high for organizations running affected kernels, especially those with exposed netlink interfaces or root access. The potential for denial of service or privilege escalation warrants prompt remediation.

Generated by OpenCVE AI on May 14, 2026 at 13:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the system to a Linux kernel release that includes the net_shapers double‑free fix
  • Reboot the host after updating the kernel to ensure the patched code is active
  • Verify that any custom net‑shaping modules are removed or updated to avoid the buggy code path

Generated by OpenCVE AI on May 14, 2026 at 13:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1341
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Wed, 13 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net-shapers: don't free reply skb after genlmsg_reply() genlmsg_reply() hands the reply skb to netlink, and netlink_unicast() consumes it on all return paths, whether the skb is queued successfully or freed on an error path. net_shaper_nl_get_doit() and net_shaper_nl_cap_get_doit() currently jump to free_msg after genlmsg_reply() fails and call nlmsg_free(msg), which can hit the same skb twice. Return the genlmsg_reply() error directly and keep free_msg only for pre-reply failures.
Title net-shapers: don't free reply skb after genlmsg_reply()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-13T15:08:29.116Z

Reserved: 2026-05-01T14:12:56.012Z

Link: CVE-2026-43481

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-13T16:16:51.287

Modified: 2026-05-13T16:16:51.287

Link: CVE-2026-43481

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-13T00:00:00Z

Links: CVE-2026-43481 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T13:30:06Z

Weaknesses