-

CVE-2026-31422

net/sched: cls_flow: fix NULL pointer dereference on shared blocks

In the Linux kernel, the following vulnerability has been resolved:

net/sched: cls_flow: fix NULL pointer dereference on shared blocks

flow_change() calls tcf_block_q() and dereferences q->handle to derive
a default baseclass.  Shared blocks leave block->q NULL, causing a NULL
deref when a flow filter without a fully qualified baseclass is created
on a shared block.

Check tcf_block_shared() before accessing block->q and return -EINVAL
for shared blocks.  This avoids the null-deref shown below:

=======================================================================
KASAN: null-ptr-deref in range [0x0000000000000038-0x000000000000003f]
RIP: 0010:flow_change (net/sched/cls_flow.c:508)
Call Trace:
 tc_new_tfilter (net/sched/cls_api.c:2432)
 rtnetlink_rcv_msg (net/core/rtnetlink.c:6980)
 [...]
=======================================================================
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 1abf272022cf1d18469405f47b4ec49c6a3125db
Version < 57f94ac7e953eece5ed4819605a18f3cdfc63dcc
Status affected
Version 1abf272022cf1d18469405f47b4ec49c6a3125db
Version < 942813276edeb1741fa5b0a73471beb4e495fa08
Status affected
Version 1abf272022cf1d18469405f47b4ec49c6a3125db
Version < cc707a4fd4c3b6ab2722e06bc359aa010e13d408
Status affected
Version 1abf272022cf1d18469405f47b4ec49c6a3125db
Version < 4a09f72007201c9f667dc47f64517ec23eea65e5
Status affected
Version 1abf272022cf1d18469405f47b4ec49c6a3125db
Version < 9bf5fc36a43f7b8b5507c96e74fb81f1e8b4957e
Status affected
Version 1abf272022cf1d18469405f47b4ec49c6a3125db
Version < a208c3e1232997e9317887294c20008dfcb75449
Status affected
Version 1abf272022cf1d18469405f47b4ec49c6a3125db
Version < 415ea0c973c754b9f375225807810eb9045f4293
Status affected
Version 1abf272022cf1d18469405f47b4ec49c6a3125db
Version < 1a280dd4bd1d616a01d6ffe0de284c907b555504
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.15
Status affected
Version 0
Version < 4.15
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.168
Status unaffected
Version <= 6.6.*
Version 6.6.134
Status unaffected
Version <= 6.12.*
Version 6.12.81
Status unaffected
Version <= 6.18.*
Version 6.18.22
Status unaffected
Version <= 6.19.*
Version 6.19.12
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.104
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.