CVE-2026-22985
BaseFortify
Publication date: 2026-01-23
Last updated on: 2026-04-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.7 (inc) to 6.18.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's idpf driver where the RSS LUT (Receive Side Scaling Lookup Table) is not initialized until the network interface is brought up. If ethtool operations like turning rxhash on or off are performed before the interface is up, it causes a NULL pointer dereference crash. The fix involves initializing the RSS LUT earlier during vport creation to prevent this crash and allow RSS configuration before the interface is up.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference when performing certain ethtool operations on the idpf network interface before it is brought up. This can lead to system instability or downtime until the issue is resolved or the system is rebooted.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to perform ethtool operations like turning rxhash on or off on an idpf interface before the interface is brought up. For example, loading the idpf driver with 'modprobe idpf' and then running 'ethtool -K eth2 rxhash off' before bringing the interface up may trigger a kernel NULL pointer dereference crash, which can be observed in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the RSS LUT initialization occurs earlier by moving it from ndo_open to vport creation, so the LUT is always available. Practically, avoid performing ethtool operations like rxhash on/off before the network interface is brought up. Bringing the interface up before changing rxhash settings prevents the NULL pointer crash.