CVE-2026-23064

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_ife: avoid possible NULL deref tcf_ife_encode() must make sure ife_encode() does not return NULL. syzbot reported: Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] RIP: 0010:ife_tlv_meta_encode+0x41/0xa0 net/ife/ife.c:166 CPU: 3 UID: 0 PID: 8990 Comm: syz.0.696 Not tainted syzkaller #0 PREEMPT(full) Call Trace: <TASK> ife_encode_meta_u32+0x153/0x180 net/sched/act_ife.c:101 tcf_ife_encode net/sched/act_ife.c:841 [inline] tcf_ife_act+0x1022/0x1de0 net/sched/act_ife.c:877 tc_act include/net/tc_wrapper.h:130 [inline] tcf_action_exec+0x1c0/0xa20 net/sched/act_api.c:1152 tcf_exts_exec include/net/pkt_cls.h:349 [inline] mall_classify+0x1a0/0x2a0 net/sched/cls_matchall.c:42 tc_classify include/net/tc_wrapper.h:197 [inline] __tcf_classify net/sched/cls_api.c:1764 [inline] tcf_classify+0x7f2/0x1380 net/sched/cls_api.c:1860 multiq_classify net/sched/sch_multiq.c:39 [inline] multiq_enqueue+0xe0/0x510 net/sched/sch_multiq.c:66 dev_qdisc_enqueue+0x45/0x250 net/core/dev.c:4147 __dev_xmit_skb net/core/dev.c:4262 [inline] __dev_queue_xmit+0x2998/0x46c0 net/core/dev.c:4798
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*

History

13 Mar 2026, 21:28

Type Values Removed Values Added
CWE CWE-476
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: net/sched: act_ife: evitar posible desreferencia de NULL tcf_ife_encode() debe asegurarse de que ife_encode() no devuelva NULL. syzbot informó: Oops: fallo de protección general, probablemente para dirección no canónica 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI KASAN: desreferencia de puntero nulo en el rango [0x0000000000000000-0x0000000000000007] RIP: 0010:ife_tlv_meta_encode+0x41/0xa0 net/ife/ife.c:166 CPU: 3 UID: 0 PID: 8990 Comm: syz.0.696 No contaminado syzkaller #0 PREEMPT(full) Traza de Llamada: ife_encode_meta_u32+0x153/0x180 net/sched/act_ife.c:101 tcf_ife_encode net/sched/act_ife.c:841 [inline] tcf_ife_act+0x1022/0x1de0 net/sched/act_ife.c:877 tc_act include/net/tc_wrapper.h:130 [inline] tcf_action_exec+0x1c0/0xa20 net/sched/act_api.c:1152 tcf_exts_exec include/net/pkt_cls.h:349 [inline] mall_classify+0x1a0/0x2a0 net/sched/cls_matchall.c:42 tc_classify include/net/tc_wrapper.h:197 [inline] __tcf_classify net/sched/cls_api.c:1764 [inline] tcf_classify+0x7f2/0x1380 net/sched/cls_api.c:1860 multiq_classify net/sched/sch_multiq.c:39 [inline] multiq_enqueue+0xe0/0x510 net/sched/sch_multiq.c:66 dev_qdisc_enqueue+0x45/0x250 net/core/dev.c:4147 __dev_xmit_skb net/core/dev.c:4262 [inline] __dev_queue_xmit+0x2998/0x46c0 net/core/dev.c:4798
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/03710cebfc0bcfe247a9e04381e79ea33896e278 - () https://git.kernel.org/stable/c/03710cebfc0bcfe247a9e04381e79ea33896e278 - Patch
References () https://git.kernel.org/stable/c/1440d749fe49c8665da6f744323b1671d25a56a0 - () https://git.kernel.org/stable/c/1440d749fe49c8665da6f744323b1671d25a56a0 - Patch
References () https://git.kernel.org/stable/c/27880b0b0d35ad1c98863d09788254e36f874968 - () https://git.kernel.org/stable/c/27880b0b0d35ad1c98863d09788254e36f874968 - Patch
References () https://git.kernel.org/stable/c/374915dfc932adf57712df3be010667fd1190e3c - () https://git.kernel.org/stable/c/374915dfc932adf57712df3be010667fd1190e3c - Patch
References () https://git.kernel.org/stable/c/4ef2c77851676b7ed106f0c47755bee9eeec9a40 - () https://git.kernel.org/stable/c/4ef2c77851676b7ed106f0c47755bee9eeec9a40 - Patch
References () https://git.kernel.org/stable/c/6c75fed55080014545f262b7055081cec4768b20 - () https://git.kernel.org/stable/c/6c75fed55080014545f262b7055081cec4768b20 - Patch
References () https://git.kernel.org/stable/c/dd9442aedbeae87c44cc64c0ee41abd296dc008b - () https://git.kernel.org/stable/c/dd9442aedbeae87c44cc64c0ee41abd296dc008b - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/1440d749fe49c8665da6f744323b1671d25a56a0 -
  • () https://git.kernel.org/stable/c/4ef2c77851676b7ed106f0c47755bee9eeec9a40 -
  • () https://git.kernel.org/stable/c/dd9442aedbeae87c44cc64c0ee41abd296dc008b -

04 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 17:16

Updated : 2026-03-13 21:28


NVD link : CVE-2026-23064

Mitre link : CVE-2026-23064

CVE.ORG link : CVE-2026-23064


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference