CVE-2026-23204
Published: February 19, 2026Last modified: February 20, 2026
Description
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.1 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Vulnerable (6.1.163-r0) |
| 25 LTS | linux-lts | Fixed (6.12.73-r0) | |
| Stream | linux-lts | Fixed (6.12.71-r0) |
References
- https://git.kernel.org/stable/c/13336a6239b9d7c6e61483017bb8bdfe3ceb10a5
- https://git.kernel.org/stable/c/8a672f177ebe19c93d795fbe967846084fbc7943
- https://git.kernel.org/stable/c/cabd1a976375780dabab888784e356f574bbaed8
- https://git.kernel.org/stable/c/cfa745830e45ecb75c061aa34330ee0cac941cc7
- https://git.kernel.org/stable/c/e41a23e61259f5526af875c3b86b3d42a9bae0e5