In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23204-be85@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:6036 https://access.redhat.com/errata/RHSA-2026:6036
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:6037 https://access.redhat.com/errata/RHSA-2026:6037
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:6153 https://access.redhat.com/errata/RHSA-2026:6153
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:6632 https://access.redhat.com/errata/RHSA-2026:6632
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:8342 https://access.redhat.com/errata/RHSA-2026:8342