PT-2026-26130 · Linux · Linux
Published
2026-03-18
·
Updated
2026-03-18
·
CVE-2026-23270
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
net/sched: Only allow act ct to bind to clsact/ingress qdiscs and shared blocks
As Paolo said earlier [1]:
"Since the blamed commit below, classify can return TC ACT CONSUMED while
the current skb being held by the defragmentation engine. As reported by
GangMin Kim, if such packet is that may cause a UaF when the defrag engine
later on tries to tuch again such packet."
act ct was never meant to be used in the egress path, however some users
are attaching it to egress today [2]. Attempting to reach a middle
ground, we noticed that, while most qdiscs are not handling
TC ACT CONSUMED, clsact/ingress qdiscs are. With that in mind, we
address the issue by only allowing act ct to bind to clsact/ingress
qdiscs and shared blocks. That way it's still possible to attach act ct to
egress (albeit only with clsact).
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux