7.8

CVE-2026-23245

net/sched: act_gate: snapshot parameters with RCU on replace

In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_gate: snapshot parameters with RCU on replace

The gate action can be replaced while the hrtimer callback or dump path is
walking the schedule list.

Convert the parameters to an RCU-protected snapshot and swap updates under
tcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits
the entry list, preserve the existing schedule so the effective state is
unchanged.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version a51c328df3106663879645680609eb49b3ff6444
Version < fc98fd8d214693be91253d9a88cdf8e5e143d124
Status affected
Version a51c328df3106663879645680609eb49b3ff6444
Version < 8b1251bbf0f10ac745ed74bad4d3b433caa1eeae
Status affected
Version a51c328df3106663879645680609eb49b3ff6444
Version < dfc314d7c767e350f78a46a8f8b134f80e8ad432
Status affected
Version a51c328df3106663879645680609eb49b3ff6444
Version < 035d0d09d5ab3ed3e93d18cde2b562a6719eea23
Status affected
Version a51c328df3106663879645680609eb49b3ff6444
Version < 04d75529dc0f9be78786162ebab7424af4644df2
Status affected
Version a51c328df3106663879645680609eb49b3ff6444
Version < 58b162e318d0243ad2d7d92456c0873f2494c351
Status affected
Version a51c328df3106663879645680609eb49b3ff6444
Version < 62413a9c3cb183afb9bb6e94dd68caf4e4145f4c
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.8
Status affected
Version 0
Version < 5.8
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.18
Status unaffected
Version <= 6.19.*
Version 6.19.8
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.033
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
416baaa9-dc9f-4396-8d5f-8c081fb06d67 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Es wurden noch keine Informationen zu CWE veröffentlicht.