PT-2026-32349 · Linux · Linux
Published
2026-04-13
·
Updated
2026-04-13
·
CVE-2026-31423
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch hfsc: fix divide-by-zero in rtsc min()
m2sm() converts a u32 slope to a u64 scaled value. For large inputs
(e.g. m1=4000000000), the result can reach 2^32. rtsc min() stores
the difference of two such u64 values in a u32 variable
dsm and
uses it as a divisor. When the difference is exactly 2^32 the
truncation yields zero, causing a divide-by-zero oops in the
concave-curve intersection path:Oops: divide error: 0000
RIP: 0010:rtsc min (net/sched/sch hfsc.c:601)
Call Trace:
init ed (net/sched/sch hfsc.c:629)
hfsc enqueue (net/sched/sch hfsc.c:1569)
[...]
Widen
dsm to u64 and replace do div() with div64 u64() so the full
difference is preserved. Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux