CVE-2026-23204

HIGH

Linux kernel - Use After Free

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221

Scores

CVSS v3 7.1
EPSS 0.0002
EPSS Percentile 4.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Details

CWE
CWE-125
Status published
Products (18)
linux/Kernel 2.6.35 - 6.6.124linux
linux/Kernel 6.13.0 - 6.18.10linux
linux/Kernel 6.7.0 - 6.12.70linux
Linux/Linux < 2.6.35
Linux/Linux 2.6.35
Linux/Linux 6.1.167 - 6.1.*
Linux/Linux 6.12.70 - 6.12.*
Linux/Linux 6.18.10 - 6.18.*
Linux/Linux 6.19
Linux/Linux 6.6.124 - 6.6.*
... and 8 more
Published Feb 14, 2026
Tracked Since Feb 18, 2026