Home

Description

In the Linux kernel, the following vulnerability has been resolved: net/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash() Commit 38a6f0865796 ("net: sched: support hash selecting tx queue") added SKBEDIT_F_TXQ_SKBHASH support. The inclusive range size is computed as: mapping_mod = queue_mapping_max - queue_mapping + 1; The range size can be 65536 when the requested range covers all possible u16 queue IDs (e.g. queue_mapping=0 and queue_mapping_max=U16_MAX). That value cannot be represented in a u16 and previously wrapped to 0, so tcf_skbedit_hash() could trigger a divide-by-zero: queue_mapping += skb_get_hash(skb) % params->mapping_mod; Compute mapping_mod in a wider type and reject ranges larger than U16_MAX to prevent params->mapping_mod from becoming 0 and avoid the crash.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-06 | Assigner Linux

Product status

Default status
unaffected

38a6f0865796e26fc38fff4858f681d9ae76fa0f (git) before 59809fda4da7730cfe84a948033f47eb45db073d
affected

38a6f0865796e26fc38fff4858f681d9ae76fa0f (git) before 9c735a7d98c982a786b0db71eb6566ee00aaa04f
affected

38a6f0865796e26fc38fff4858f681d9ae76fa0f (git) before 015cebdfcb97b5347fb7f598ea712a281cb35840
affected

38a6f0865796e26fc38fff4858f681d9ae76fa0f (git) before 4ece5eb4836f8ff03b9004dc2430a7169f282851
affected

38a6f0865796e26fc38fff4858f681d9ae76fa0f (git) before 3c2b95b26860bd6f8e2310d31ea1200d3f8f173e
affected

38a6f0865796e26fc38fff4858f681d9ae76fa0f (git) before be054cc66f739a9ba615dba9012a07fab8e7dd6f
affected

Default status
affected

5.19
affected

Any version before 5.19
unaffected

6.1.165 (semver)
unaffected

6.6.128 (semver)
unaffected

6.12.75 (semver)
unaffected

6.18.16 (semver)
unaffected

6.19.6 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/59809fda4da7730cfe84a948033f47eb45db073d

git.kernel.org/...c/9c735a7d98c982a786b0db71eb6566ee00aaa04f

git.kernel.org/...c/015cebdfcb97b5347fb7f598ea712a281cb35840

git.kernel.org/...c/4ece5eb4836f8ff03b9004dc2430a7169f282851

git.kernel.org/...c/3c2b95b26860bd6f8e2310d31ea1200d3f8f173e

git.kernel.org/...c/be054cc66f739a9ba615dba9012a07fab8e7dd6f

cve.org (CVE-2026-43238)

nvd.nist.gov (CVE-2026-43238)

Download JSON