CVE-2026-23200
ECMP Count Mismatch Bug in Linux Kernel IPv6 Routing
Publication date: 2026-02-14
Last updated on: 2026-03-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.17.13 (inc) to 6.18 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.12.63 (inc) to 6.12.70 (exc) |
| linux | linux_kernel | From 6.18.2 (inc) to 6.18.10 (exc) |
| linux | linux_kernel | From 6.6.120 (inc) to 6.6.124 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's IPv6 routing code. It occurs due to a logic error introduced when clearing the RTF_ADDRCONF flag from existing routes while adding a static route with the same nexthop. Specifically, if the existing route has a gateway, clearing this flag makes the route eligible for Equal-Cost Multi-Path (ECMP) routing, but the route is not properly added to the internal sibling list that tracks ECMP routes.
This mismatch between the sibling count and the actual siblings in the list causes a kernel BUG in the function fib6_add_rt2node() when a subsequent ECMP route is added, leading to a crash or instability.
The fix involves only clearing the RTF_ADDRCONF flag when the existing route does not have a gateway, which prevents the mismatch and maintains proper ECMP route tracking.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to hit a BUG condition and crash or become unstable when managing IPv6 routes involving ECMP. This can lead to system crashes or denial of service, impacting the availability and reliability of systems running vulnerable kernel versions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel BUG in the function fib6_add_rt2node() when adding an IPv6 route, which can cause system crashes or kernel oops messages.
To detect this issue, monitor your system logs (e.g., dmesg or /var/log/kern.log) for kernel BUG messages related to fib6_add_rt2node or IPv6 routing errors.
You can use the following command to check kernel logs for relevant errors:
- dmesg | grep -i 'fib6_add_rt2node\|BUG\|ipv6'
Additionally, checking for kernel oops or panic messages related to IPv6 routing in system logs can help identify if the vulnerability is triggered.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by a kernel patch that changes the logic to only clear the RTF_ADDRCONF flag when the existing route does not have a gateway.
Immediate mitigation steps include:
- Update your Linux kernel to a version that includes the fix for this vulnerability.
- Avoid adding static IPv6 routes that could trigger the bug until the kernel is patched.
- Monitor system stability and kernel logs for any signs of the bug to prevent unexpected crashes.