CVE-2026-23379
Divide-by-Zero Vulnerability in Linux Kernel ETS Offload Path
Publication date: 2026-03-25
Last updated on: 2026-04-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.6 |
| linux | linux_kernel | From 6.19 (inc) to 6.19.7 (exc) |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.17 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.130 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.77 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.203 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.167 (exc) |
| linux | linux_kernel | From 5.6.1 (inc) to 5.10.253 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-369 | The product divides a value by zero. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided CVE description does not include any information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's network scheduler component, specifically in the ETS (Enhanced Transmission Selection) offload path.
The issue arises because the calculation of each class's WRR (Weighted Round Robin) weight uses unsigned 32-bit integers for summing quanta values ('q_sum' and 'q_psum'). This can cause integer overflow and lead to a division by zero error.
When this division by zero occurs, it triggers a kernel panic, causing the system to crash with a fatal exception.
The fix involves using 64-bit integers for these sums to prevent overflow and avoid the division by zero.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash unexpectedly due to a kernel panic triggered by a division by zero error.
Such crashes can lead to system downtime, loss of availability, and potential disruption of services running on affected systems.
In environments relying on network traffic scheduling and offloading, this could impact network performance and reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel panic caused by a divide by zero error in the Linux kernel's ETS offload path. Detection involves monitoring system logs for kernel panic messages or Oops traces related to 'ets_offload_change' or 'sch_ets'.
You can check your system logs for such errors using commands like:
- dmesg | grep -i 'ets_offload_change'
- journalctl -k | grep -i 'divide error'
- grep -i 'Kernel panic' /var/log/kern.log
Additionally, monitoring for crashes or unexpected reboots related to traffic control (tc) commands or ETS offloading may indicate the presence of this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where this vulnerability is fixed. The fix involves using 64-bit integers for the variables 'q_sum' and 'q_psum' to prevent overflow and division by zero.
Until the kernel is updated, avoid enabling or using ETS offloading features that trigger this code path, as they can cause kernel panics.
Monitoring and restricting the use of traffic control (tc) commands related to ETS offload may reduce the risk of triggering the vulnerability.