Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-23270— net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks

CVSS 7.8 · High EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-23270

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks As Paolo said earlier [1]: "Since the blamed commit below, classify can return TC_ACT_CONSUMED while the current skb being held by the defragmentation engine. As reported by GangMin Kim, if such packet is that may cause a UaF when the defrag engine later on tries to tuch again such packet." act_ct was never meant to be used in the egress path, however some users are attaching it to egress today [2]. Attempting to reach a middle ground, we noticed that, while most qdiscs are not handling TC_ACT_CONSUMED, clsact/ingress qdiscs are. With that in mind, we address the issue by only allowing act_ct to bind to clsact/ingress qdiscs and shared blocks. That way it's still possible to attach act_ct to egress (albeit only with clsact). [1] https://lore.kernel.org/netdev/674b8cbfc385c6f37fb29a1de08d8fe5c2b0fbee.1771321118.git.pabeni@redhat.com/ [2] https://lore.kernel.org/netdev/cc6bfb4a-4a2b-42d8-b9ce-7ef6644fb22b@ovn.org/
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于act_ct绑定限制不足,可能导致释放后重用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 172ba7d46c202e679f3ccb10264c67416aaeb1c4 ~ bc4e5bb529823a09f02dbe96169de679a9db26e0 -
LinuxLinux 6.8 -

II. Public POCs for CVE-2026-23270

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-23270

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-03-18 · 35 CVEs total

CVE-2026-232468.8 HIGHwifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration
CVE-2026-232687.8 HIGHapparmor: fix unprivileged local user can do privileged policy management
CVE-2026-232537.8 HIGHmedia: dvb-core: fix wrong reinitialization of ringbuffer on reopen
CVE-2026-232487.8 HIGHperf/core: Fix refcount bug and potential UAF in perf_mmap
CVE-2026-232457.8 HIGHnet/sched: act_gate: snapshot parameters with RCU on replace
CVE-2026-232437.8 HIGHRDMA/umad: Reject negative data_len in ib_umad_write
CVE-2026-232427.5 HIGHRDMA/siw: Fix potential NULL pointer dereference in header processing
CVE-2026-232697.1 HIGHapparmor: validate DFA start states are in bounds in unpack_pdb
CVE-2025-71267fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST
CVE-2026-23244nvme: fix memory allocation in nvme_pr_read_keys()
CVE-2025-71266fs: ntfs3: check return value of indx_find to avoid infinite loop
CVE-2026-23247tcp: secure_seq: add back ports to TS offset
CVE-2026-23249xfs: check for deleted cursors when revalidating two btrees
CVE-2026-23250xfs: check return value of xchk_scrub_create_subord
CVE-2026-23251xfs: only call xf{array,blob}_destroy if we have a valid pointer
CVE-2026-23252xfs: get rid of the xchk_xfile_*_descr calls
CVE-2025-71265fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata
CVE-2025-71268btrfs: fix reservation leak in some error paths when inserting inline extent
CVE-2025-71269btrfs: do not free data reservation in fallback from inline due to -ENOSPC
CVE-2025-71270LoongArch: Enable exception fixup for specific ADE subcode

Showing top 20 of 35 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-23270

No comments yet


Leave a comment