PT-2026-26048 · Linux · Linux
Published
2026-03-18
·
Updated
2026-03-18
·
CVE-2026-23245
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
net/sched: act gate: snapshot parameters with RCU on replace
The gate action can be replaced while the hrtimer callback or dump path is
walking the schedule list.
Convert the parameters to an RCU-protected snapshot and swap updates under
tcf lock, freeing the previous snapshot via call rcu(). When REPLACE omits
the entry list, preserve the existing schedule so the effective state is
unchanged.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux