7.8

CVE-2026-23270

net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks

In the Linux kernel, the following vulnerability has been resolved:

net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks

As Paolo said earlier [1]:

"Since the blamed commit below, classify can return TC_ACT_CONSUMED while
the current skb being held by the defragmentation engine. As reported by
GangMin Kim, if such packet is that may cause a UaF when the defrag engine
later on tries to tuch again such packet."

act_ct was never meant to be used in the egress path, however some users
are attaching it to egress today [2]. Attempting to reach a middle
ground, we noticed that, while most qdiscs are not handling
TC_ACT_CONSUMED, clsact/ingress qdiscs are. With that in mind, we
address the issue by only allowing act_ct to bind to clsact/ingress
qdiscs and shared blocks. That way it's still possible to attach act_ct to
egress (albeit only with clsact).

[1] https://lore.kernel.org/netdev/674b8cbfc385c6f37fb29a1de08d8fe5c2b0fbee.1771321118.git.pabeni@redhat.com/
[2] https://lore.kernel.org/netdev/cc6bfb4a-4a2b-42d8-b9ce-7ef6644fb22b@ovn.org/
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 172ba7d46c202e679f3ccb10264c67416aaeb1c4
Version < bc4e5bb529823a09f02dbe96169de679a9db26e0
Status affected
Version 0b5b831122fc3789fff75be433ba3e4dd7b779d4
Version < fb3c380a54e33d1fd272cc342faa906d787d7ef1
Status affected
Version 73f7da5fd124f2cda9161e2e46114915e6e82e97
Version < 5a110ddcc99bda77a28598b3555fe009eaab3828
Status affected
Version 3f14b377d01d8357eba032b4cabc8c1149b458b6
Version < 524ce8b4ea8f64900b6c52b6a28df74f6bc0801e
Status affected
Version 3f14b377d01d8357eba032b4cabc8c1149b458b6
Version < 380ad8b7c65ea7aa10ef2258297079ed5ac1f5b6
Status affected
Version 3f14b377d01d8357eba032b4cabc8c1149b458b6
Version < 9deda0fcda5c1f388c5e279541850b71a2ccfcf4
Status affected
Version 3f14b377d01d8357eba032b4cabc8c1149b458b6
Version < 11cb63b0d1a0685e0831ae3c77223e002ef18189
Status affected
Version f5346df0591d10bc948761ca854b1fae6d2ef441
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 6.8
Status affected
Version 0
Version < 6.8
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.77
Status unaffected
Version <= 6.18.*
Version 6.18.18
Status unaffected
Version <= 6.19.*
Version 6.19.8
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.034
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
416baaa9-dc9f-4396-8d5f-8c081fb06d67 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Es wurden noch keine Informationen zu CWE veröffentlicht.