CVE-2026-23016
BaseFortify
Publication date: 2026-01-31
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.18 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.18.1 (inc) to 6.18.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the handling of fragmented network packets and their associated connection tracking (conntrack) references. Specifically, when fragmented packets are reassembled and then refragmented, the skbs (socket buffers) retain nf_conn (connection tracking) references via their frag_list. This causes conntrack cleanup to get stuck or hang because these references are not properly released. The issue arises because the skb_release_head_state() function does not follow the fraglist to release these references, leading to leaked conntrack references and potential hangs during cleanup.
How can this vulnerability impact me? :
This vulnerability can cause the conntrack cleanup process in the Linux kernel to hang or get blocked for extended periods (e.g., 60 seconds), potentially leading to resource leaks and system instability. It can also prevent the removal of the conntrack module until userspace has consumed the affected packets, which may impact network performance and reliability, especially in environments handling fragmented UDP or TCP packets with Path MTU discovery disabled.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing warnings related to conntrack cleanup being blocked, such as the message: 'conntrack cleanup blocked for 60s' and warnings in net/netfilter/nf_conntrack_core.c. The ip_defrag.sh selftest script can reproduce the problem. Additionally, setting the kernel parameter net.core.skb_defer_max=0 can make the hang disappear, which can be used as a diagnostic step.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include setting the kernel parameter net.core.skb_defer_max=0 to avoid the hang caused by skb deferral. Also, applying fixes that drop nf_conn entries when skbs are placed in the defrag queue can help. These fixes involve letting the defrag engine drop nf_conn entries, calling kick_defer_list_purge() from the conntrack netns exit callback, or adding skb_has_frag_list() checks to skb_attempt_defer_free().