-

CVE-2026-23300

net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop

In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop

When a standalone IPv6 nexthop object is created with a loopback device
(e.g., "ip -6 nexthop add id 100 dev lo"), fib6_nh_init() misclassifies
it as a reject route. This is because nexthop objects have no destination
prefix (fc_dst=::), causing fib6_is_reject() to match any loopback
nexthop. The reject path skips fib_nh_common_init(), leaving
nhc_pcpu_rth_output unallocated. If an IPv4 route later references this
nexthop, __mkroute_output() dereferences NULL nhc_pcpu_rth_output and
panics.

Simplify the check in fib6_nh_init() to only match explicit reject
routes (RTF_REJECT) instead of using fib6_is_reject(). The loopback
promotion heuristic in fib6_is_reject() is handled separately by
ip6_route_info_create_nh(). After this change, the three cases behave
as follows:

1. Explicit reject route ("ip -6 route add unreachable 2001:db8::/64"):
   RTF_REJECT is set, enters reject path, skips fib_nh_common_init().
   No behavior change.

2. Implicit loopback reject route ("ip -6 route add 2001:db8::/32 dev lo"):
   RTF_REJECT is not set, takes normal path, fib_nh_common_init() is
   called. ip6_route_info_create_nh() still promotes it to reject
   afterward. nhc_pcpu_rth_output is allocated but unused, which is
   harmless.

3. Standalone nexthop object ("ip -6 nexthop add id 100 dev lo"):
   RTF_REJECT is not set, takes normal path, fib_nh_common_init() is
   called. nhc_pcpu_rth_output is properly allocated, fixing the crash
   when IPv4 routes reference this nexthop.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 493ced1ac47c48bb86d9d4e8e87df8592be85a0e
Version < 607e68c1b7c5a30c795571be1906d716e989a644
Status affected
Version 493ced1ac47c48bb86d9d4e8e87df8592be85a0e
Version < c11d7c56c2076ee9cd72004f1976fe0734df2ae9
Status affected
Version 493ced1ac47c48bb86d9d4e8e87df8592be85a0e
Version < b5062fc2150614c9ea8a611c2e0cb6e047ebfa3a
Status affected
Version 493ced1ac47c48bb86d9d4e8e87df8592be85a0e
Version < b299121e7453d23faddf464087dff513a495b4fc
Status affected
Version 493ced1ac47c48bb86d9d4e8e87df8592be85a0e
Version < f7c9f8e3607440fe39300efbaf46cf7b5eecb23f
Status affected
Version 493ced1ac47c48bb86d9d4e8e87df8592be85a0e
Version < b3b5a037d520afe3d5276e653bc0ff516bbda34c
Status affected
Version 493ced1ac47c48bb86d9d4e8e87df8592be85a0e
Version < 8650db85b4259d2885d2a80fbc2317ce24194133
Status affected
Version 493ced1ac47c48bb86d9d4e8e87df8592be85a0e
Version < 21ec92774d1536f71bdc90b0e3d052eff99cf093
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.3
Status affected
Version 0
Version < 5.3
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.77
Status unaffected
Version <= 6.18.*
Version 6.18.17
Status unaffected
Version <= 6.19.*
Version 6.19.7
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.102
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.