CVE-2026-22987 PUBLISHED

net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy

Assigner: Linux
Reserved: 13.01.2026 Published: 23.01.2026 Updated: 23.01.2026

In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy

syzbot reported a crash in tc_act_in_hw() during netns teardown where tcf_idrinfo_destroy() passed an ERR_PTR(-EBUSY) value as a tc_action pointer, leading to an invalid dereference.

Guard against ERR_PTR entries when iterating the action IDR so teardown does not call tc_act_in_hw() on an error pointer.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 84a7d6797e6a03705e6b48c613fa424662049d87 to 67550a1130b647bb0d093c9c0a810c69aa6a30a8 (excl.)
  • affected from 84a7d6797e6a03705e6b48c613fa424662049d87 to adb25a46dc0a43173f5ea5f5f58fc8ba28970c7c (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.17 is affected
  • unaffected from 0 to 6.17 (excl.)
  • unaffected from 6.18.6 to 6.18.* (incl.)
  • unaffected from 6.19-rc5 to * (incl.)

References