CVE-2026-23439
NULL Pointer Dereference in Linux Kernel udp_tunnel with IPv6 Disabled
Publication date: 2026-04-03
Last updated on: 2026-04-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 3.18 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.2 (inc) to 6.6.130 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.203 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.167 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.78 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.20 (exc) |
| linux | linux_kernel | From 6.19 (inc) to 6.19.10 (exc) |
| linux | linux_kernel | From 3.18.1 (inc) to 5.10.253 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's udp_tunnel component when IPv6 support (CONFIG_IPV6) is disabled. The function udp_sock_create6() incorrectly returns success (0) without actually creating a socket. As a result, functions that rely on this socket, such as fou_create(), attempt to use an uninitialized socket pointer, leading to a NULL pointer dereference and a kernel crash.
The issue is fixed by changing udp_sock_create6() to return an error code (-EPFNOSUPPORT) when IPv6 is disabled, allowing callers to handle the error properly instead of dereferencing a NULL pointer.
How can this vulnerability impact me? :
This vulnerability can cause a kernel NULL pointer dereference crash, which may lead to a denial of service (DoS) condition by crashing the Linux kernel. However, only privileged users can trigger this vulnerability, limiting the risk to unauthorized users.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability causes a NULL pointer dereference in the Linux kernel when CONFIG_IPV6 is disabled and a privileged user triggers the udp_sock_create6 function. Detection would involve monitoring for kernel crash logs containing messages like "BUG: kernel NULL pointer dereference" and traces referencing fou_nl_add_doit or udp_sock_create6.
Since the issue is triggered by privileged users invoking certain socket creation calls, checking kernel logs (e.g., using dmesg or journalctl) for related NULL pointer dereference crashes can help detect exploitation attempts.
No specific commands are provided in the available information.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by a patch that changes udp_sock_create6 to return an error (-EPFNOSUPPORT) instead of success when CONFIG_IPV6 is disabled, preventing NULL pointer dereference.
Immediate mitigation steps include applying the relevant Linux kernel patch or updating to a kernel version that includes this fix.
Additionally, restricting privileged user access to systems where this vulnerability could be triggered can reduce risk.