CVE-2026-23105

In the Linux kernel, the following vulnerability has been resolved: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag This is more of a preventive patch to make the code more consistent and to prevent possible exploits that employ child qlen manipulations on qfq. use cl_is_active instead of relying on the child qdisc's qlen to determine class activation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*

History

03 Apr 2026, 14:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 7.8

19 Mar 2026, 19:26

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: net/sched: qfq: Usar cl_is_active para determinar si la clase está activa en qfq_rm_from_ag Esto es más bien un parche preventivo para hacer el código más consistente y para prevenir posibles exploits que emplean manipulaciones de qlen secundarias en qfq. usar cl_is_active en lugar de depender del qlen del qdisc secundario para determinar la activación de la clase.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/77f1afd0bb4d5da95236f6114e6d0dfcde187ff6 - () https://git.kernel.org/stable/c/77f1afd0bb4d5da95236f6114e6d0dfcde187ff6 - Patch
References () https://git.kernel.org/stable/c/93b8635974fb050c43d07e35e5edfe6e685ca28a - () https://git.kernel.org/stable/c/93b8635974fb050c43d07e35e5edfe6e685ca28a - Patch
References () https://git.kernel.org/stable/c/abd9fc26ea577561a5ef6241a1b058755ffdad0c - () https://git.kernel.org/stable/c/abd9fc26ea577561a5ef6241a1b058755ffdad0c - Patch
References () https://git.kernel.org/stable/c/b8c24cf5268fb3bfb8d16324c3dbb985f698c835 - () https://git.kernel.org/stable/c/b8c24cf5268fb3bfb8d16324c3dbb985f698c835 - Patch
References () https://git.kernel.org/stable/c/d837fbee92453fbb829f950c8e7cf76207d73f33 - () https://git.kernel.org/stable/c/d837fbee92453fbb829f950c8e7cf76207d73f33 - Patch
References () https://git.kernel.org/stable/c/f27047abf7cac1b6f90c3ad60de21ef9f717c26d - () https://git.kernel.org/stable/c/f27047abf7cac1b6f90c3ad60de21ef9f717c26d - Patch
References () https://git.kernel.org/stable/c/fac2c67bb2bb732eae4283e45fc338af7e08c254 - () https://git.kernel.org/stable/c/fac2c67bb2bb732eae4283e45fc338af7e08c254 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/b8c24cf5268fb3bfb8d16324c3dbb985f698c835 -
  • () https://git.kernel.org/stable/c/f27047abf7cac1b6f90c3ad60de21ef9f717c26d -
  • () https://git.kernel.org/stable/c/fac2c67bb2bb732eae4283e45fc338af7e08c254 -

04 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 17:16

Updated : 2026-04-03 14:16


NVD link : CVE-2026-23105

Mitre link : CVE-2026-23105

CVE.ORG link : CVE-2026-23105


JSON object : View

Products Affected

linux

  • linux_kernel