{"api_version":"1","generated_at":"2026-05-06T16:46:29+00:00","cve":"CVE-2026-43238","urls":{"html":"https://cve.report/CVE-2026-43238","api":"https://cve.report/api/cve/CVE-2026-43238.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43238","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43238"},"summary":{"title":"net/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash()","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash()\n\nCommit 38a6f0865796 (\"net: sched: support hash selecting tx queue\")\nadded SKBEDIT_F_TXQ_SKBHASH support. The inclusive range size is\ncomputed as:\n\nmapping_mod = queue_mapping_max - queue_mapping + 1;\n\nThe range size can be 65536 when the requested range covers all possible\nu16 queue IDs (e.g. queue_mapping=0 and queue_mapping_max=U16_MAX).\nThat value cannot be represented in a u16 and previously wrapped to 0,\nso tcf_skbedit_hash() could trigger a divide-by-zero:\n\nqueue_mapping += skb_get_hash(skb) % params->mapping_mod;\n\nCompute mapping_mod in a wider type and reject ranges larger than U16_MAX\nto prevent params->mapping_mod from becoming 0 and avoid the crash.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-06 12:16:44","updated_at":"2026-05-06 13:07:51"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/be054cc66f739a9ba615dba9012a07fab8e7dd6f","name":"https://git.kernel.org/stable/c/be054cc66f739a9ba615dba9012a07fab8e7dd6f","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/3c2b95b26860bd6f8e2310d31ea1200d3f8f173e","name":"https://git.kernel.org/stable/c/3c2b95b26860bd6f8e2310d31ea1200d3f8f173e","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/59809fda4da7730cfe84a948033f47eb45db073d","name":"https://git.kernel.org/stable/c/59809fda4da7730cfe84a948033f47eb45db073d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/4ece5eb4836f8ff03b9004dc2430a7169f282851","name":"https://git.kernel.org/stable/c/4ece5eb4836f8ff03b9004dc2430a7169f282851","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/015cebdfcb97b5347fb7f598ea712a281cb35840","name":"https://git.kernel.org/stable/c/015cebdfcb97b5347fb7f598ea712a281cb35840","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/9c735a7d98c982a786b0db71eb6566ee00aaa04f","name":"https://git.kernel.org/stable/c/9c735a7d98c982a786b0db71eb6566ee00aaa04f","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43238","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43238","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f 59809fda4da7730cfe84a948033f47eb45db073d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f 9c735a7d98c982a786b0db71eb6566ee00aaa04f git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f 015cebdfcb97b5347fb7f598ea712a281cb35840 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f 4ece5eb4836f8ff03b9004dc2430a7169f282851 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f 3c2b95b26860bd6f8e2310d31ea1200d3f8f173e git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 38a6f0865796e26fc38fff4858f681d9ae76fa0f be054cc66f739a9ba615dba9012a07fab8e7dd6f git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 5.19","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.19 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.165 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.128 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.75 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.16 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.6 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["net/sched/act_skbedit.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"59809fda4da7730cfe84a948033f47eb45db073d","status":"affected","version":"38a6f0865796e26fc38fff4858f681d9ae76fa0f","versionType":"git"},{"lessThan":"9c735a7d98c982a786b0db71eb6566ee00aaa04f","status":"affected","version":"38a6f0865796e26fc38fff4858f681d9ae76fa0f","versionType":"git"},{"lessThan":"015cebdfcb97b5347fb7f598ea712a281cb35840","status":"affected","version":"38a6f0865796e26fc38fff4858f681d9ae76fa0f","versionType":"git"},{"lessThan":"4ece5eb4836f8ff03b9004dc2430a7169f282851","status":"affected","version":"38a6f0865796e26fc38fff4858f681d9ae76fa0f","versionType":"git"},{"lessThan":"3c2b95b26860bd6f8e2310d31ea1200d3f8f173e","status":"affected","version":"38a6f0865796e26fc38fff4858f681d9ae76fa0f","versionType":"git"},{"lessThan":"be054cc66f739a9ba615dba9012a07fab8e7dd6f","status":"affected","version":"38a6f0865796e26fc38fff4858f681d9ae76fa0f","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["net/sched/act_skbedit.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"5.19"},{"lessThan":"5.19","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.165","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.128","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.75","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.16","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.6","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.165","versionStartIncluding":"5.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.128","versionStartIncluding":"5.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.75","versionStartIncluding":"5.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.16","versionStartIncluding":"5.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.6","versionStartIncluding":"5.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"5.19","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash()\n\nCommit 38a6f0865796 (\"net: sched: support hash selecting tx queue\")\nadded SKBEDIT_F_TXQ_SKBHASH support. The inclusive range size is\ncomputed as:\n\nmapping_mod = queue_mapping_max - queue_mapping + 1;\n\nThe range size can be 65536 when the requested range covers all possible\nu16 queue IDs (e.g. queue_mapping=0 and queue_mapping_max=U16_MAX).\nThat value cannot be represented in a u16 and previously wrapped to 0,\nso tcf_skbedit_hash() could trigger a divide-by-zero:\n\nqueue_mapping += skb_get_hash(skb) % params->mapping_mod;\n\nCompute mapping_mod in a wider type and reject ranges larger than U16_MAX\nto prevent params->mapping_mod from becoming 0 and avoid the crash."}],"providerMetadata":{"dateUpdated":"2026-05-06T11:28:32.950Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/59809fda4da7730cfe84a948033f47eb45db073d"},{"url":"https://git.kernel.org/stable/c/9c735a7d98c982a786b0db71eb6566ee00aaa04f"},{"url":"https://git.kernel.org/stable/c/015cebdfcb97b5347fb7f598ea712a281cb35840"},{"url":"https://git.kernel.org/stable/c/4ece5eb4836f8ff03b9004dc2430a7169f282851"},{"url":"https://git.kernel.org/stable/c/3c2b95b26860bd6f8e2310d31ea1200d3f8f173e"},{"url":"https://git.kernel.org/stable/c/be054cc66f739a9ba615dba9012a07fab8e7dd6f"}],"title":"net/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash()","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43238","datePublished":"2026-05-06T11:28:32.950Z","dateReserved":"2026-05-01T14:12:55.995Z","dateUpdated":"2026-05-06T11:28:32.950Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-06 12:16:44","lastModifiedDate":"2026-05-06 13:07:51","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43238","Ordinal":"1","Title":"net/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash()","CVE":"CVE-2026-43238","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43238","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash()\n\nCommit 38a6f0865796 (\"net: sched: support hash selecting tx queue\")\nadded SKBEDIT_F_TXQ_SKBHASH support. The inclusive range size is\ncomputed as:\n\nmapping_mod = queue_mapping_max - queue_mapping + 1;\n\nThe range size can be 65536 when the requested range covers all possible\nu16 queue IDs (e.g. queue_mapping=0 and queue_mapping_max=U16_MAX).\nThat value cannot be represented in a u16 and previously wrapped to 0,\nso tcf_skbedit_hash() could trigger a divide-by-zero:\n\nqueue_mapping += skb_get_hash(skb) % params->mapping_mod;\n\nCompute mapping_mod in a wider type and reject ranges larger than U16_MAX\nto prevent params->mapping_mod from becoming 0 and avoid the crash.","Type":"Description","Title":"net/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash()"}]}}}