CVE-2026-23379 — Integer Overflow or Wraparound in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 90.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
net/sched: ets: fix divide by zero in the offload path
Offloading ETS requires computing each class' WRR weight: this is done by
averaging over the sums of quanta as 'q_sum' and 'q_psum'. Using unsigned
int, the same integer size as the individual DRR quanta, can overflow and
even cause division by zero, like it happened in the following splat:
Oops: divide error: 0000 [#1] SMP PTI
CPU: 13 UID: 0 PID: 487 Comm: tc Tainted: G …
Affected Packages5 packages
▶CVEListV5linux/linuxd35eb52bd2ac7557b62bda52668f2e64dde2cf90 — 3912871344d6a0f1f572a7af2716968182d1e536+6
🔴Vulnerability Details
3OSV▶
CVE-2026-23379: In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: fix divide by zero in the offload path Offloading ETS requires com↗2026-03-25
GHSA▶
GHSA-3p6h-g5j4-c7h7: In the Linux kernel, the following vulnerability has been resolved:
net/sched: ets: fix divide by zero in the offload path
Offloading ETS requires c↗2026-03-25