CVE-2026-23245
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
18/03/2026
Última modificación:
18/03/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/sched: act_gate: snapshot parameters with RCU on replace<br />
<br />
The gate action can be replaced while the hrtimer callback or dump path is<br />
walking the schedule list.<br />
<br />
Convert the parameters to an RCU-protected snapshot and swap updates under<br />
tcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits<br />
the entry list, preserve the existing schedule so the effective state is<br />
unchanged.



