| Summary | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_netem: fix out-of-bounds access in packet corruption In netem_enqueue(), the packet corruption logic uses Passing 0 to get_random_u32_below() takes the variable-ceil slow path Fix this by verifying skb_headlen(skb) is non-zero before attempting |
|---|---|
| Publication Date | April 25, 2026, 6:16 p.m. |
| Registration Date | April 26, 2026, 4:07 a.m. |
| Last Update | April 25, 2026, 6:16 p.m. |