#VU124206 Buffer over-read in Linux kernel - CVE-2026-23245

 

#VU124206 Buffer over-read in Linux kernel - CVE-2026-23245

Published: March 20, 2026


Vulnerability identifier: #VU124206
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-23245
CWE-ID: CWE-126
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Linux kernel
Software vendor:
Linux Foundation

Description

The vulnerability allows a local user to cause a denial of service.

The vulnerability exists due to improper memory management in the net/sched: act_gate component when handling action replacement while the hrtimer callback or dump path is walking the schedule list. A local user can trigger a race condition to cause a denial of service.

Exploitation requires access to the network scheduling subsystem and occurs due to lack of proper synchronization during parameter updates.


Remediation

Install security update from vendor's repository.

External links