CVE-2026-23460
NULL Pointer Dereference in Linux Kernel ROSE Socket Handling
Publication date: 2026-04-03
Last updated on: 2026-04-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's net/rose module, specifically in the rose_transmit_link function. It occurs when a second connection attempt is made while the first connection is still in progress (TCP_SYN_SENT state). The rose_connect() function lacks a check for this TCP_SYN_SENT state, which can lead to the socket's neighbour pointer being set to NULL.
When the socket is later closed, the code attempts to use this NULL neighbour pointer in rose_transmit_link, causing a NULL pointer dereference. This is a type of software bug that can cause the kernel to crash or behave unexpectedly.
The fix involves adding the missing check for the TCP_SYN_SENT state in rose_connect() to prevent overwriting the neighbour pointer with NULL and to properly handle multiple connection attempts.
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference in the Linux kernel, which may lead to a kernel crash or system instability when the affected code path is triggered.
Such crashes can result in denial of service (DoS) conditions, potentially disrupting normal operations on systems using the affected Linux kernel version.