Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2026-23270

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
18/03/2026
Última modificación:
19/03/2026

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks<br /> <br /> As Paolo said earlier [1]:<br /> <br /> "Since the blamed commit below, classify can return TC_ACT_CONSUMED while<br /> the current skb being held by the defragmentation engine. As reported by<br /> GangMin Kim, if such packet is that may cause a UaF when the defrag engine<br /> later on tries to tuch again such packet."<br /> <br /> act_ct was never meant to be used in the egress path, however some users<br /> are attaching it to egress today [2]. Attempting to reach a middle<br /> ground, we noticed that, while most qdiscs are not handling<br /> TC_ACT_CONSUMED, clsact/ingress qdiscs are. With that in mind, we<br /> address the issue by only allowing act_ct to bind to clsact/ingress<br /> qdiscs and shared blocks. That way it&amp;#39;s still possible to attach act_ct to<br /> egress (albeit only with clsact).<br /> <br /> [1] https://lore.kernel.org/netdev/674b8cbfc385c6f37fb29a1de08d8fe5c2b0fbee.1771321118.git.pabeni@redhat.com/<br /> [2] https://lore.kernel.org/netdev/cc6bfb4a-4a2b-42d8-b9ce-7ef6644fb22b@ovn.org/

Impacto