CVE-2026-22976
BaseFortify
Publication date: 2026-01-21
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.11 (inc) to 5.15.198 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.6 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.121 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.66 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.161 (exc) |
| linux | linux_kernel | From 3.0 (inc) to 5.10.248 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's qfq (Quick Fair Queueing) scheduler. It occurs when the kernel tries to deactivate an inactive aggregate in the qfq_reset function. Specifically, two qfq_class objects may point to the same leaf_qdisc, and under certain conditions, the qfq_reset function wrongly deactivates an inactive aggregate, leading to a NULL pointer dereference and a kernel crash (Oops).
How can this vulnerability impact me? :
This vulnerability can cause a kernel NULL pointer dereference, leading to a system crash or denial of service. An attacker could potentially exploit this to disrupt system operations by triggering the kernel oops, affecting system stability and availability.