Логотип exploitDog
bind:CVE-2026-23245
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-23245

Количество 6

Количество 6

ubuntu логотип

CVE-2026-23245

9 дней назад

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot parameters with RCU on replace The gate action can be replaced while the hrtimer callback or dump path is walking the schedule list. Convert the parameters to an RCU-protected snapshot and swap updates under tcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits the entry list, preserve the existing schedule so the effective state is unchanged.

EPSS: Низкий
redhat логотип

CVE-2026-23245

10 дней назад

No description is available for this CVE.

EPSS: Низкий
nvd логотип

CVE-2026-23245

9 дней назад

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot parameters with RCU on replace The gate action can be replaced while the hrtimer callback or dump path is walking the schedule list. Convert the parameters to an RCU-protected snapshot and swap updates under tcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits the entry list, preserve the existing schedule so the effective state is unchanged.

EPSS: Низкий
msrc логотип

CVE-2026-23245

9 дней назад

net/sched: act_gate: snapshot parameters with RCU on replace

EPSS: Низкий
debian логотип

CVE-2026-23245

9 дней назад

In the Linux kernel, the following vulnerability has been resolved: n ...

EPSS: Низкий
github логотип

GHSA-vw2r-ffc4-8xm3

9 дней назад

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot parameters with RCU on replace The gate action can be replaced while the hrtimer callback or dump path is walking the schedule list. Convert the parameters to an RCU-protected snapshot and swap updates under tcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits the entry list, preserve the existing schedule so the effective state is unchanged.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-23245

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot parameters with RCU on replace The gate action can be replaced while the hrtimer callback or dump path is walking the schedule list. Convert the parameters to an RCU-protected snapshot and swap updates under tcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits the entry list, preserve the existing schedule so the effective state is unchanged.

0%
Низкий
9 дней назад
redhat логотип
CVE-2026-23245

No description is available for this CVE.

0%
Низкий
10 дней назад
nvd логотип
CVE-2026-23245

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot parameters with RCU on replace The gate action can be replaced while the hrtimer callback or dump path is walking the schedule list. Convert the parameters to an RCU-protected snapshot and swap updates under tcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits the entry list, preserve the existing schedule so the effective state is unchanged.

0%
Низкий
9 дней назад
msrc логотип
CVE-2026-23245

net/sched: act_gate: snapshot parameters with RCU on replace

0%
Низкий
9 дней назад
debian логотип
CVE-2026-23245

In the Linux kernel, the following vulnerability has been resolved: n ...

0%
Низкий
9 дней назад
github логотип
GHSA-vw2r-ffc4-8xm3

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_gate: snapshot parameters with RCU on replace The gate action can be replaced while the hrtimer callback or dump path is walking the schedule list. Convert the parameters to an RCU-protected snapshot and swap updates under tcf_lock, freeing the previous snapshot via call_rcu(). When REPLACE omits the entry list, preserve the existing schedule so the effective state is unchanged.

0%
Низкий
9 дней назад

Уязвимостей на страницу