The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23413

CVE-2026-23413: Linux Kernel Use-After-Free Vulnerability

CVE-2026-23413 is a use-after-free vulnerability in the Linux kernel's clsact qdisc component that occurs during init/destroy rollback. This post explains the technical details, affected versions, impact, and mitigation steps.

Published: April 2, 2026

CVE-2026-23413 Overview

A use-after-free vulnerability has been identified in the Linux kernel's clsact qdisc implementation. The flaw exists in the init/destroy rollback asymmetry handling, where improper reference counting during initialization failure and subsequent cleanup leads to memory corruption conditions. When a clsact qdisc replacement fails midway through initialization, the destroy callback improperly accesses memory that may have already been freed or belongs to a previous clsact instance.

Critical Impact

Successful exploitation of this use-after-free vulnerability could allow local attackers with sufficient privileges to cause system instability, denial of service, or potentially achieve privilege escalation through kernel memory corruption.

Affected Products

  • Linux Kernel (multiple versions with clsact qdisc support)
  • Linux distributions using affected kernel versions with Traffic Control (tc) subsystem enabled
  • Systems utilizing BPF/tcx functionality with clsact qdisc

Discovery Timeline

  • 2026-04-02 - CVE CVE-2026-23413 published to NVD
  • 2026-04-02 - Last updated in NVD database

Technical Details for CVE-2026-23413

Vulnerability Analysis

The vulnerability resides in the clsact qdisc module of the Linux kernel's network Traffic Control subsystem. The clsact qdisc is responsible for managing ingress and egress traffic classification, often used in conjunction with BPF programs for packet processing.

The clsact_init() function initializes the ingress component first, then proceeds to initialize the egress component. During this two-stage initialization, tcf_block_get_ext() is called for each direction. If this function fails during egress initialization (after ingress has been successfully initialized), the kernel triggers clsact_destroy() for cleanup.

The root cause lies in how clsact_destroy() determines what needs to be cleaned up. Prior to the fix, the destroy function checked whether {ingress,egress}_entry pointers were non-NULL to decide whether to release resources. However, during a replacement scenario where a new clsact instance fails midway, both entry pointers could be non-NULL—with the egress_entry actually pointing to a valid entry from the previous clsact instance rather than the partially-initialized new instance.

This creates a use-after-free scenario where the destroy callback may attempt to decrement reference counts or release resources that either don't belong to the current instance or have already been freed.

Root Cause

The vulnerability stems from an incorrect assumption in the clsact_destroy() callback. The function used non-NULL pointer checks on ingress_entry and egress_entry to determine initialization state, but these checks are insufficient during qdisc replacement failures. As noted in commit 1cb6f0bae504 ("bpf: Fix too early release of tcx_entry"), the transition handling between old and new clsact instances can result in the entry pointers referencing the previous instance's data even when the new instance initialization failed partway through.

The fix introduces a helper function mini_qdisc_pair_inited() that accurately tracks whether the qdisc instance-specific ingress or egress side was actually initialized, ensuring proper cleanup only of resources that belong to the failing instance.

Attack Vector

Exploitation requires local access with privileges to manipulate network qdisc configurations via the Traffic Control (tc) interface. An attacker would need to:

  1. Create a clsact qdisc on a network interface
  2. Trigger a replacement operation for the clsact qdisc
  3. Cause the replacement to fail midway through initialization (e.g., by exhausting resources or triggering an error in tcf_block_get_ext())
  4. Exploit the resulting memory corruption from the improper cleanup

The vulnerability mechanism can be understood through the initialization flow where clsact_init() first calls tcx_miniq_inc() for ingress, then attempts the same for egress. If the egress initialization fails via tcf_block_get_ext(), the subsequent clsact_destroy() call would incorrectly attempt to clean up the egress entry from the previous instance.

Detection Methods for CVE-2026-23413

Indicators of Compromise

  • Unexpected kernel panics or crashes related to the Traffic Control (tc) subsystem or clsact qdisc operations
  • Kernel log messages indicating use-after-free conditions in the networking stack, particularly mentioning clsact_destroy or tcf_block functions
  • KASAN (Kernel Address Sanitizer) reports highlighting memory access violations in qdisc-related code paths

Detection Strategies

  • Enable KASAN (Kernel Address Sanitizer) on test systems to detect use-after-free conditions during qdisc operations
  • Monitor kernel logs for oops messages or warnings related to Traffic Control subsystem components
  • Implement audit rules for tc command executions that modify qdisc configurations
  • Deploy kernel live patching solutions to detect and alert on unpatched kernel versions

Monitoring Recommendations

  • Configure syslog monitoring for kernel panic events and networking subsystem errors
  • Monitor system stability metrics for unexpected increases in kernel-level crashes or restarts
  • Track tc command usage patterns for anomalous qdisc manipulation activity
  • Enable eBPF tracing on clsact_init and clsact_destroy functions for detailed debugging if exploitation is suspected

How to Mitigate CVE-2026-23413

Immediate Actions Required

  • Update the Linux kernel to a patched version containing the fix introducing the mini_qdisc_pair_inited() helper function
  • Review system configurations for unnecessary use of clsact qdisc and disable if not required
  • Restrict access to the tc command and netlink socket operations to trusted administrators only
  • Enable kernel security features such as KASLR and SMAP/SMEP to reduce exploitation potential

Patch Information

The fix has been committed to the Linux kernel stable tree. Multiple commits address this vulnerability across different kernel branches:

  • Kernel Commit 0509b762bc5e
  • Kernel Commit 37bef86e5428
  • Kernel Commit 4c9af67f99aa
  • Kernel Commit a0671125d4f5
  • Kernel Commit a73d95b57bf9

The patches add a mini_qdisc_pair_inited() helper function that properly tracks the initialization state of each qdisc direction, ensuring clsact_destroy() only releases resources that were actually initialized by the current instance.

Workarounds

  • Limit access to the Traffic Control (tc) interface to highly privileged users via system hardening and access controls
  • Avoid frequent clsact qdisc replacement operations in production environments until patched
  • Consider using alternative qdisc types if clsact functionality is not essential for your network configuration
  • Deploy mandatory access control policies (SELinux, AppArmor) restricting network configuration changes
bash
# Restrict tc command access to root only
chmod 750 /sbin/tc
chown root:root /sbin/tc

# Audit tc command usage
auditctl -a always,exit -F path=/sbin/tc -F perm=x -k tc_usage

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeUse After Free

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Git Commit Log

  • Kernel Git Commit Log

  • Kernel Git Commit Log

  • Kernel Git Commit Log

  • Kernel Git Commit Log
  • Related CVEs
  • CVE-2026-23408: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-23415: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-23412: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-23396: Linux Kernel Use-After-Free Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English