Description
In the Linux kernel, the following vulnerability has been resolved:

ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data()

We need to check __in6_dev_get() for possible NULL value, as
suggested by Yiming Qian.

Also add skb_dst_dev_rcu() instead of skb_dst_dev(),
and two missing READ_ONCE().

Note that @dev can't be NULL.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from a missing NULL check in the __ioam6_fill_trace_data() function, allowing a potential NULL pointer dereference during IPv6 IOAM trace data handling. This can lead to a kernel panic, effectively denying service or allowing attackers to trigger a crash if they can influence the trace data processing. The flaw originates from unsafe access to device pointers without sufficient validation, as noted by the fix that adds checks and READ_ONCE() statements.

Affected Systems

Linux kernels that implement the IOAM IPv6 trace data path in the kernel's networking stack. The vulnerability is present in all versions prior to the commit that added the NULL checks; no specific version numbers are listed in the input, so any Linux kernel version that contains the old implementation is susceptible. The fix applies to the Linux kernel source, affecting all distributions that use the stock kernel without updates.

Risk and Exploitability

The CVSS or EPSS data is not available, and the vulnerability is not listed in CISA's KEV catalog. The likely attack vector is via crafted IPv6 IOAM packets that reach the kernel's trace data processor, which can be triggered when the system processes traffic from an external host or compromised client. As the kernel can crash, the exploitation would result in denial of service; no remote code execution is reported. However, because the flaw only induces a crash and is triggered by network traffic, it may be exploited by attackers who can send specially crafted packets. Given the lack of publicly known exploits, the risk remains moderate but should be mitigated promptly.

Generated by OpenCVE AI on May 6, 2026 at 12:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to the latest stable release that includes the fix for __ioam6_fill_trace_data(), ensuring the NULL pointer check and additional READ_ONCE() protections are applied.
  • If an update is not immediately possible, apply a hardening measure by disabling or restricting IOAM trace data handling through kernel sysctl or network configuration to prevent the vulnerable function from being invoked.
  • Verify kernel logs for any Oops or panic events related to IOAM trace data and monitor for abnormal network activity that could indicate exploitation attempts.

Generated by OpenCVE AI on May 6, 2026 at 12:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 06 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data() We need to check __in6_dev_get() for possible NULL value, as suggested by Yiming Qian. Also add skb_dst_dev_rcu() instead of skb_dst_dev(), and two missing READ_ONCE(). Note that @dev can't be NULL.
Title ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T07:40:30.969Z

Reserved: 2026-05-01T14:12:55.984Z

Link: CVE-2026-43101

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T10:16:23.637

Modified: 2026-05-06T10:16:23.637

Link: CVE-2026-43101

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T12:15:03Z

Weaknesses