ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data()
Summary
| CVE | CVE-2026-43101 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-06 10:16:23 UTC |
| Updated | 2026-05-06 13:07:51 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data()
We need to check __in6_dev_get() for possible NULL value, as
suggested by Yiming Qian.
Also add skb_dst_dev_rcu() instead of skb_dst_dev(),
and two missing READ_ONCE().
Note that @dev can't be NULL. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 9ee11f0fff205b4b3df9750bff5e94f97c71b6a0 4198aab6f000b4febb18ea820fea20634dd789c7 git |
Not specified |
| CNA |
Linux |
Linux |
affected 9ee11f0fff205b4b3df9750bff5e94f97c71b6a0 3719c234fa94c37c955b1ecd3742ef280ec135e6 git |
Not specified |
| CNA |
Linux |
Linux |
affected 9ee11f0fff205b4b3df9750bff5e94f97c71b6a0 4e65a8b8daa18d63255ec58964dd192c7fdd9f8b git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.15 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.24 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.14 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/4198aab6f000b4febb18ea820fea20634dd789c7 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/4e65a8b8daa18d63255ec58964dd192c7fdd9f8b |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/3719c234fa94c37c955b1ecd3742ef280ec135e6 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.