net/sched: act_gate: snapshot parameters with RCU on replace
Summary
| CVE | CVE-2026-23245 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-18 11:16:16 UTC |
| Updated | 2026-04-18 09:16:14 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot parameters with RCU on replace The gate action can be replaced while the hrtimer callback or dump path is walking the schedule list. Convert the parameters to an RCU-protected snapshot and swap updates under tcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits the entry list, preserve the existing schedule so the effective state is unchanged. |
Risk And Classification
Primary CVSS: v3.1 7.8 HIGH from 416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.000150000 probability, percentile 0.032890000 (date 2026-04-19)
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Secondary | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected a51c328df3106663879645680609eb49b3ff6444 fc98fd8d214693be91253d9a88cdf8e5e143d124 git | Not specified |
| CNA | Linux | Linux | affected a51c328df3106663879645680609eb49b3ff6444 8b1251bbf0f10ac745ed74bad4d3b433caa1eeae git | Not specified |
| CNA | Linux | Linux | affected a51c328df3106663879645680609eb49b3ff6444 dfc314d7c767e350f78a46a8f8b134f80e8ad432 git | Not specified |
| CNA | Linux | Linux | affected a51c328df3106663879645680609eb49b3ff6444 035d0d09d5ab3ed3e93d18cde2b562a6719eea23 git | Not specified |
| CNA | Linux | Linux | affected a51c328df3106663879645680609eb49b3ff6444 04d75529dc0f9be78786162ebab7424af4644df2 git | Not specified |
| CNA | Linux | Linux | affected a51c328df3106663879645680609eb49b3ff6444 58b162e318d0243ad2d7d92456c0873f2494c351 git | Not specified |
| CNA | Linux | Linux | affected a51c328df3106663879645680609eb49b3ff6444 62413a9c3cb183afb9bb6e94dd68caf4e4145f4c git | Not specified |
| CNA | Linux | Linux | affected 5.8 | Not specified |
| CNA | Linux | Linux | unaffected 5.8 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.167 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.130 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.78 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.18 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.8 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/58b162e318d0243ad2d7d92456c0873f2494c351 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/04d75529dc0f9be78786162ebab7424af4644df2 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/fc98fd8d214693be91253d9a88cdf8e5e143d124 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/62413a9c3cb183afb9bb6e94dd68caf4e4145f4c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/8b1251bbf0f10ac745ed74bad4d3b433caa1eeae | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/035d0d09d5ab3ed3e93d18cde2b562a6719eea23 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/dfc314d7c767e350f78a46a8f8b134f80e8ad432 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.