SB2026041422 - NULL pointer dereference in Linux kernel sched
Published: April 14, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2026-31422)
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to a null pointer dereference in flow_change() in the cls_flow classifier when creating a flow filter without a fully qualified baseclass on a shared block. A local user can create such a flow filter to cause a denial of service.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/1a280dd4bd1d616a01d6ffe0de284c907b555504
- https://git.kernel.org/stable/c/415ea0c973c754b9f375225807810eb9045f4293
- https://git.kernel.org/stable/c/4a09f72007201c9f667dc47f64517ec23eea65e5
- https://git.kernel.org/stable/c/9bf5fc36a43f7b8b5507c96e74fb81f1e8b4957e
- https://git.kernel.org/stable/c/a208c3e1232997e9317887294c20008dfcb75449
- https://git.kernel.org/stable/c/cc707a4fd4c3b6ab2722e06bc359aa010e13d408