-
CVE-2026-23293
- EPSS 0.04%
- Veröffentlicht 25.03.2026 10:26:51
- Zuletzt bearbeitet 18.04.2026 09:16:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled
In the Linux kernel, the following vulnerability has been resolved: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled When booting with the 'ipv6.disable=1' parameter, the nd_tbl is never initialized because inet6_init() exits before ndisc_init() is called which initializes it. If an IPv6 packet is injected into the interface, route_shortcircuit() is called and a NULL pointer dereference happens on neigh_lookup(). BUG: kernel NULL pointer dereference, address: 0000000000000380 Oops: Oops: 0000 [#1] SMP NOPTI [...] RIP: 0010:neigh_lookup+0x20/0x270 [...] Call Trace: <TASK> vxlan_xmit+0x638/0x1ef0 [vxlan] dev_hard_start_xmit+0x9e/0x2e0 __dev_queue_xmit+0xbee/0x14e0 packet_sendmsg+0x116f/0x1930 __sys_sendto+0x1f5/0x200 __x64_sys_sendto+0x24/0x30 do_syscall_64+0x12f/0x1590 entry_SYSCALL_64_after_hwframe+0x76/0x7e Fix this by adding an early check on route_shortcircuit() when protocol is ETH_P_IPV6. Note that ipv6_mod_enabled() cannot be used here because VXLAN can be built-in even when IPv6 is built as a module.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
e15a00aafa4b7953ad717d3cb1ad7acf4ff76945
Version <
649e2bb74da54c96cf20729001e283626a2fefa0
Status
affected
Version
e15a00aafa4b7953ad717d3cb1ad7acf4ff76945
Version <
dc3e62cf3bbf66280a907ec379f373d0c3b8b2bc
Status
affected
Version
e15a00aafa4b7953ad717d3cb1ad7acf4ff76945
Version <
b5190fcd75a1f1785c766a8d1e44d3938e168f45
Status
affected
Version
e15a00aafa4b7953ad717d3cb1ad7acf4ff76945
Version <
5f93e6b4d12bd3a4517a6d447ea675f448f21434
Status
affected
Version
e15a00aafa4b7953ad717d3cb1ad7acf4ff76945
Version <
f0373e9317bc904e7bdb123d3106fe4f3cea2fb7
Status
affected
Version
e15a00aafa4b7953ad717d3cb1ad7acf4ff76945
Version <
fbbd2118982c55fb9b0a753ae0cf7194e77149fb
Status
affected
Version
e15a00aafa4b7953ad717d3cb1ad7acf4ff76945
Version <
abcd48ecdeb2e12eccb8339a35534c757782afcd
Status
affected
Version
e15a00aafa4b7953ad717d3cb1ad7acf4ff76945
Version <
168ff39e4758897d2eee4756977d036d52884c7e
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.12
Status
affected
Version
0
Version <
3.12
Status
unaffected
Version <=
5.10.*
Version
5.10.253
Status
unaffected
Version <=
5.15.*
Version
5.15.203
Status
unaffected
Version <=
6.1.*
Version
6.1.167
Status
unaffected
Version <=
6.6.*
Version
6.6.130
Status
unaffected
Version <=
6.12.*
Version
6.12.77
Status
unaffected
Version <=
6.18.*
Version
6.18.17
Status
unaffected
Version <=
6.19.*
Version
6.19.7
Status
unaffected
Version <=
*
Version
7.0
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.102 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|