Description
In the Linux kernel, the following vulnerability has been resolved:

net/sched: cls_u32: use skb_header_pointer_careful()

skb_header_pointer() does not fully validate negative @offset values.

Use skb_header_pointer_careful() instead.

GangMin Kim provided a report and a repro fooling u32_classify():

BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0
net/sched/cls_u32.c:221
Published: 2026-02-14
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Out-of-Bounds Read in Linux kernel net/sched: cls_u32 module
Action: Patch
AI Analysis

Impact

The vulnerability resides in the Linux kernel’s net/sched subsystem, specifically within the u32 classifier. The function skb_header_pointer() does not fully validate negative offset values, allowing the code to request packet header data from an out‑of‑bounds location. This flaw permits a kernel memory read outside its intended bounds, as demonstrated by the KASAN report when u32_classify() is invoked. The immediate consequence is potential information disclosure; leaking kernel memory contents could provide attackers with data useful for more advanced exploits, though it does not directly grant code execution. The weakness is classified as CWE‑125, Out‑of‑Bound Read.

Affected Systems

All currently released Linux kernel versions that include the u32 classifier are impacted. The CPE entries list a broad range of releases from early 2.6.35 release candidates through 6.19 release candidates (rc1–rc8), and the vendor list indicates the generic Linux kernel in use. Any system operating a kernel that contains the indicated commit before the patch is vulnerable, regardless of distribution or patch level.

Risk and Exploitability

The CVSS score of 7.1 signals moderate‑high severity. EPSS is very low (<1%), meaning wild exploitation is unlikely at present, and the vulnerability is not in the CISA KEV catalog. The attack vector is not explicitly described in the CVE data, but it is inferred that an attacker would need the ability to inject crafted packets that trigger the u32 classifier. This typically requires local or privileged access to the network stack, suggesting the vulnerability is more likely to be exploited from a local compromise or by a malicious process that can influence traffic processed by the cls_u32 module. Once triggered, the out‑of‑bounds read could leak sensitive kernel memory data, potentially aiding further attacks such as privilege escalation or sophisticated denial‑of‑service scenarios. The patch replaces skb_header_pointer() with skb_header_pointer_careful(), adding proper bounds checking and thereby eliminating the vulnerability.

Generated by OpenCVE AI on April 16, 2026 at 00:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel release that includes the patch replacing skb_header_pointer() with skb_header_pointer_careful()
  • If an immediate kernel update is not feasible, disable or unload the cls_u32 module to eliminate the vulnerable code path
  • Review and adjust any packet filtering rules or traffic classes that rely on u32 classification to remove or modify them

Generated by OpenCVE AI on April 16, 2026 at 00:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6141-1 linux security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Wed, 25 Mar 2026 10:45:00 +0000


Thu, 19 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
CPEs cpe:2.3:o:linux:linux_kernel:2.6.35:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.35:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Important


Sat, 14 Feb 2026 16:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221
Title net/sched: cls_u32: use skb_header_pointer_careful()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T13:32:30.124Z

Reserved: 2026-01-13T15:37:45.986Z

Link: CVE-2026-23204

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2026-02-14T17:15:58.297

Modified: 2026-04-03T14:16:27.310

Link: CVE-2026-23204

cve-icon Redhat

Severity : Important

Publid Date: 2026-02-14T00:00:00Z

Links: CVE-2026-23204 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T00:45:15Z

Weaknesses