CVE-2026-22979
BaseFortify
Publication date: 2026-01-23
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.9 |
| linux | linux_kernel | 6.9 |
| linux | linux_kernel | 6.9 |
| linux | linux_kernel | 6.9 |
| linux | linux_kernel | 6.9 |
| linux | linux_kernel | From 5.15.154 (inc) to 5.16 (exc) |
| linux | linux_kernel | 6.9 |
| linux | linux_kernel | From 6.8.5 (inc) to 6.9 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.6 (exc) |
| linux | linux_kernel | From 6.1.85 (inc) to 6.1.161 (exc) |
| linux | linux_kernel | From 6.6.26 (inc) to 6.6.121 (exc) |
| linux | linux_kernel | From 6.9.1 (inc) to 6.12.66 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's skb_segment_list function, which handles packets aggregated by the Generic Receive Offload (GRO) engine. Due to a change in how socket memory ownership is managed for packet fragments, the function incorrectly subtracts memory accounting for fragments that are no longer charged to the socket. This causes an under-count of memory when the parent socket buffer (SKB) is freed, leading to a persistent memory leak that prevents proper socket destruction.
How can this vulnerability impact me? :
The memory leak caused by this vulnerability can lead to increased memory usage in the kernel, as socket memory allocations are not properly freed. Over time, this can degrade system performance, cause resource exhaustion, and potentially lead to denial of service conditions due to inability to allocate new sockets or network buffers.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing memory leaks related to socket memory accounting in the Linux kernel. Specifically, the leak can be observed via KMEMLEAK when tearing down the networking environment. You can use the kmemleak tool to detect unreferenced objects indicating memory leaks. For example, enabling kmemleak and checking its output with commands like: 1. echo scan > /sys/kernel/debug/kmemleak 2. cat /sys/kernel/debug/kmemleak This will show unreferenced objects such as socket allocations that were not freed properly, which is indicative of this vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this vulnerability. The fix removes the incorrect truesize adjustment in skb_segment_list() for SKB_GSO_FRAGLIST packets and preserves the call to skb_release_head_state() to correctly manage socket memory accounting. Until the kernel is updated, monitoring for memory leaks using kmemleak and limiting exposure to heavy GRO packet forwarding may help reduce impact.