CVE-2026-23245Linux vulnerability

9 documents8 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 97.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 18

Description

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot parameters with RCU on replace The gate action can be replaced while the hrtimer callback or dump path is walking the schedule list. Convert the parameters to an RCU-protected snapshot and swap updates under tcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits the entry list, preserve the existing schedule so the effective state is unchanged.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Linuxlinux/linux_kernel5.8.06.1.167+4
Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linuxa51c328df3106663879645680609eb49b3ff64448b1251bbf0f10ac745ed74bad4d3b433caa1eeae+6

🔴Vulnerability Details

4
OSV
CVE-2026-23245: In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot parameters with RCU on replace The gate action can b2026-03-18
GHSA
GHSA-vw2r-ffc4-8xm3: In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot parameters with RCU on replace The gate action can2026-03-18
OSV
net/sched: act_gate: snapshot parameters with RCU on replace2026-03-18
CVEList
net/sched: act_gate: snapshot parameters with RCU on replace2026-03-18

📋Vendor Advisories

3
Red Hat
kernel: net/sched: act_gate: snapshot parameters with RCU on replace2026-03-18
Microsoft
net/sched: act_gate: snapshot parameters with RCU on replace2026-03-10
Debian
CVE-2026-23245: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23245 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23245 — Linux vulnerability | cvebase