๐Ÿ” CVE Alert

CVE-2026-23204

HIGH 7.1

net/sched: cls_u32: use skb_header_pointer_careful()

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
3th

In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 14, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Linux / Linux
fbc2e7d9cf49e0bf89b9e91fd60a06851a855c5d < cfa745830e45ecb75c061aa34330ee0cac941cc7 fbc2e7d9cf49e0bf89b9e91fd60a06851a855c5d < 13336a6239b9d7c6e61483017bb8bdfe3ceb10a5 fbc2e7d9cf49e0bf89b9e91fd60a06851a855c5d < e41a23e61259f5526af875c3b86b3d42a9bae0e5 fbc2e7d9cf49e0bf89b9e91fd60a06851a855c5d < 8a672f177ebe19c93d795fbe967846084fbc7943 fbc2e7d9cf49e0bf89b9e91fd60a06851a855c5d < cabd1a976375780dabab888784e356f574bbaed8
Linux / Linux
2.6.35

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/cfa745830e45ecb75c061aa34330ee0cac941cc7 git.kernel.org: https://git.kernel.org/stable/c/13336a6239b9d7c6e61483017bb8bdfe3ceb10a5 git.kernel.org: https://git.kernel.org/stable/c/e41a23e61259f5526af875c3b86b3d42a9bae0e5 git.kernel.org: https://git.kernel.org/stable/c/8a672f177ebe19c93d795fbe967846084fbc7943 git.kernel.org: https://git.kernel.org/stable/c/cabd1a976375780dabab888784e356f574bbaed8