{"id":"CVE-2026-23105","summary":"net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag\n\nThis is more of a preventive patch to make the code more consistent and\nto prevent possible exploits that employ child qlen manipulations on qfq.\nuse cl_is_active instead of relying on the child qdisc's qlen to determine\nclass activation.","modified":"2026-04-04T03:02:24.060931Z","published":"2026-02-04T16:08:26.376Z","related":["SUSE-SU-2026:0962-1","SUSE-SU-2026:1078-1","SUSE-SU-2026:1081-1","SUSE-SU-2026:20667-1","SUSE-SU-2026:20720-1","SUSE-SU-2026:20838-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","SUSE-SU-2026:20931-1","openSUSE-SU-2026:20416-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23105.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/77f1afd0bb4d5da95236f6114e6d0dfcde187ff6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/93b8635974fb050c43d07e35e5edfe6e685ca28a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/abd9fc26ea577561a5ef6241a1b058755ffdad0c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b8c24cf5268fb3bfb8d16324c3dbb985f698c835"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d837fbee92453fbb829f950c8e7cf76207d73f33"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f27047abf7cac1b6f90c3ad60de21ef9f717c26d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fac2c67bb2bb732eae4283e45fc338af7e08c254"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23105.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23105"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"462dbc9101acd38e92eda93c0726857517a24bbd"},{"fixed":"fac2c67bb2bb732eae4283e45fc338af7e08c254"},{"fixed":"b8c24cf5268fb3bfb8d16324c3dbb985f698c835"},{"fixed":"f27047abf7cac1b6f90c3ad60de21ef9f717c26d"},{"fixed":"93b8635974fb050c43d07e35e5edfe6e685ca28a"},{"fixed":"abd9fc26ea577561a5ef6241a1b058755ffdad0c"},{"fixed":"77f1afd0bb4d5da95236f6114e6d0dfcde187ff6"},{"fixed":"d837fbee92453fbb829f950c8e7cf76207d73f33"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23105.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.8.0"},{"fixed":"5.10.249"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.199"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.162"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.122"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.68"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23105.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}