CVE-2026-23277
NULL Pointer Dereference in Linux Kernel TEQL Network Scheduler
Publication date: 2026-03-20
Last updated on: 2026-04-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's network scheduling code related to TEQL (True Link Equalizer) devices. Specifically, the function teql_master_xmit() transmits packets through slave devices but fails to update the packet's device pointer (skb->dev) to the slave device before transmission.
When a gretap tunnel is used as a TEQL slave, the transmit path calls iptunnel_xmit(), which saves the device pointer from skb->dev. Because skb->dev still points to the TEQL master device (teql0) instead of the slave, the function iptunnel_xmit_stats() tries to access statistics data (tstats) that were never allocated for the master device. This results in a NULL pointer dereference and a kernel page fault, causing a crash.
The fix involves setting skb->dev to the correct slave device before transmission, ensuring that the tunnel transmit functions access the proper device statistics and avoid the NULL pointer dereference.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (page fault) when transmitting packets through a TEQL slave device configured as a gretap tunnel. Such crashes can lead to denial of service (DoS) conditions on affected systems, disrupting network communication and potentially requiring a system reboot to recover.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by ensuring that skb->dev is set to the slave device before calling netdev_start_xmit(). This prevents the NULL pointer dereference in iptunnel_xmit on TEQL slave transmit.
Immediate mitigation steps include updating the Linux kernel to a version where this fix is applied (post 2026-03-20) to avoid the page fault caused by the NULL pointer dereference.