CVE-2026-23304 PUBLISHED

ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu()

Assigner: Linux
Reserved: 13.01.2026 Published: 25.03.2026 Updated: 25.03.2026

In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu()

l3mdev_master_dev_rcu() can return NULL when the slave device is being un-slaved from a VRF. All other callers deal with this, but we lost the fallback to loopback in ip6_rt_pcpu_alloc() -> ip6_rt_get_dev_rcu() with commit 4832c30d5458 ("net: ipv6: put host and anycast routes on device with address").

KASAN: null-ptr-deref in range [0x0000000000000108-0x000000000000010f] RIP: 0010:ip6_rt_pcpu_alloc (net/ipv6/route.c:1418) Call Trace: ip6_pol_route (net/ipv6/route.c:2318) fib6_rule_lookup (net/ipv6/fib6_rules.c:115) ip6_route_output_flags (net/ipv6/route.c:2607) vrf_process_v6_outbound (drivers/net/vrf.c:437)

I was tempted to rework the un-slaving code to clear the flag first and insert synchronize_rcu() before we remove the upper. But looks like the explicit fallback to loopback_dev is an established pattern. And I guess avoiding the synchronize_rcu() is nice, too.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 4832c30d5458387ff2533ff66fbde26ad8bb5a2d to 4a48fe59f29f673a3d042d679f26629a9c3e29d4 (excl.)
  • affected from 4832c30d5458387ff2533ff66fbde26ad8bb5a2d to 581800298313c9fd75e94985e6d37d21b7e35d34 (excl.)
  • affected from 4832c30d5458387ff2533ff66fbde26ad8bb5a2d to 3310fc11fc47387d1dd4759b0bc961643ea11c7f (excl.)
  • affected from 4832c30d5458387ff2533ff66fbde26ad8bb5a2d to 0b5a7826020706057cc5a9d9009e667027f221ee (excl.)
  • affected from 4832c30d5458387ff2533ff66fbde26ad8bb5a2d to ae88c8256547b63980770a9ea7be73a15900d27e (excl.)
  • affected from 4832c30d5458387ff2533ff66fbde26ad8bb5a2d to 2ffb4f5c2ccb2fa1c049dd11899aee7967deef5a (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 4.14 is affected
  • unaffected from 0 to 4.14 (excl.)
  • unaffected from 6.1.167 to 6.1.* (incl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.77 to 6.12.* (incl.)
  • unaffected from 6.18.17 to 6.18.* (incl.)
  • unaffected from 6.19.7 to 6.19.* (incl.)
  • unaffected from 7.0-rc3 to * (incl.)

References