Linux Kernel: Potential NULL Pointer Deref in IPv6 SRv6 Paths
CVE-2026-23442 Published on April 3, 2026
ipv6: add NULL checks for idev in SRv6 paths
In the Linux kernel, the following vulnerability has been resolved:
ipv6: add NULL checks for idev in SRv6 paths
__in6_dev_get() can return NULL when the device has no IPv6 configuration
(e.g. MTU < IPV6_MIN_MTU or after NETDEV_UNREGISTER).
Add NULL checks for idev returned by __in6_dev_get() in both
seg6_hmac_validate_skb() and ipv6_srh_rcv() to prevent potential NULL
pointer dereferences.
Products Associated with CVE-2026-23442
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version 1ababeba4a21f3dba3da3523c670b207fb2feb62 and below a25853c9feea7bbf31d157ff6e004d2d3b4f7f13 is affected.
- Version 1ababeba4a21f3dba3da3523c670b207fb2feb62 and below 06413793526251870e20402c39930804f14d59c0 is affected.
- Version 4.10 is affected.
- Before 4.10 is unaffected.
- Version 6.19.10, <= 6.19.* is unaffected.
- Version 7.0-rc5, <= * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.