CVE-2026-23300
Null Pointer Dereference in Linux IPv6 Nexthop Causes Kernel Panic
Publication date: 2026-03-25
Last updated on: 2026-04-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves the creation of standalone IPv6 nexthop objects with a loopback device that can cause a kernel panic when referenced by IPv4 routes.
To detect if your system is affected, you can check for the presence of such IPv6 nexthop objects referencing the loopback device.
Suggested commands to inspect nexthop objects and routes include:
- ip -6 nexthop show
- ip -6 nexthop list
- ip -6 route show
- ip route show
Specifically, look for nexthop entries created with the loopback device (e.g., 'dev lo') and verify if any IPv4 routes reference these nexthops, which could trigger the panic.
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's networking code related to IPv6 nexthop objects. When a standalone IPv6 nexthop is created using a loopback device, the kernel misclassifies it as a reject route due to how it checks the nexthop's destination prefix. This misclassification causes the kernel to skip an important initialization step, leaving a critical pointer unallocated (NULL). Later, if an IPv4 route references this nexthop, the kernel dereferences this NULL pointer, causing a system panic (crash).
The fix simplifies the check to only consider explicit reject routes, ensuring proper initialization for standalone nexthop objects and preventing the panic.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to panic (crash) when certain IPv4 routes reference a misclassified IPv6 nexthop object. This can lead to system instability or downtime, potentially disrupting network services and operations on affected systems.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by a kernel patch that changes the way IPv6 nexthop objects referencing the loopback device are handled, preventing kernel panic.
Immediate mitigation steps include:
- Update your Linux kernel to a version that includes the fix for this vulnerability.
- Avoid creating standalone IPv6 nexthop objects with the loopback device until the fix is applied.
- Review and audit your IPv4 and IPv6 routing configurations to ensure no IPv4 routes reference such problematic nexthops.