PT-2026-32349 · Linux · Linux

Published

2026-04-13

·

Updated

2026-04-13

·

CVE-2026-31423

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch hfsc: fix divide-by-zero in rtsc min()
m2sm() converts a u32 slope to a u64 scaled value. For large inputs (e.g. m1=4000000000), the result can reach 2^32. rtsc min() stores the difference of two such u64 values in a u32 variable dsm and uses it as a divisor. When the difference is exactly 2^32 the truncation yields zero, causing a divide-by-zero oops in the concave-curve intersection path:
Oops: divide error: 0000 RIP: 0010:rtsc min (net/sched/sch hfsc.c:601) Call Trace: init ed (net/sched/sch hfsc.c:629) hfsc enqueue (net/sched/sch hfsc.c:1569) [...]
Widen dsm to u64 and replace do div() with div64 u64() so the full difference is preserved.

Related Identifiers

CVE-2026-31423

Affected Products

Linux