CVE-2026-23204
net/sched: cls_u32: use skb_header_pointer_careful()
CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
3th
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 14, 2026 |
| Last Updated | Apr 3, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Linux / Linux
fbc2e7d9cf49e0bf89b9e91fd60a06851a855c5d < cfa745830e45ecb75c061aa34330ee0cac941cc7 fbc2e7d9cf49e0bf89b9e91fd60a06851a855c5d < 13336a6239b9d7c6e61483017bb8bdfe3ceb10a5 fbc2e7d9cf49e0bf89b9e91fd60a06851a855c5d < e41a23e61259f5526af875c3b86b3d42a9bae0e5 fbc2e7d9cf49e0bf89b9e91fd60a06851a855c5d < 8a672f177ebe19c93d795fbe967846084fbc7943 fbc2e7d9cf49e0bf89b9e91fd60a06851a855c5d < cabd1a976375780dabab888784e356f574bbaed8
Linux / Linux
2.6.35
References
git.kernel.org: https://git.kernel.org/stable/c/cfa745830e45ecb75c061aa34330ee0cac941cc7 git.kernel.org: https://git.kernel.org/stable/c/13336a6239b9d7c6e61483017bb8bdfe3ceb10a5 git.kernel.org: https://git.kernel.org/stable/c/e41a23e61259f5526af875c3b86b3d42a9bae0e5 git.kernel.org: https://git.kernel.org/stable/c/8a672f177ebe19c93d795fbe967846084fbc7943 git.kernel.org: https://git.kernel.org/stable/c/cabd1a976375780dabab888784e356f574bbaed8