Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2719 articles · 104749 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23398
Linux kernel · Linux kernel

In the Linux kernel, the following vulnerability has been resolved: icmp: fix NULL pointer dereference in icmp_tag_validation() icmp_tag_validation() unconditionally dereferences the result of rcu_d

Description

In the Linux kernel, the following vulnerability has been resolved: icmp: fix NULL pointer dereference in icmp_tag_validation() icmp_tag_validation() unconditionally dereferences the result of rcu_dereference(inet_protos[proto]) without checking for NULL. The inet_protos[] array is sparse -- only about 15 of 256 protocol numbers have registered handlers. When ip_no_pmtu_disc is set to 3 (hardened PMTU mode) and the kernel receives an ICMP Fragmentation Needed error with a quoted inner IP header containing an unregistered protocol number, the NULL dereference causes a kernel panic in softirq context. Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] RIP: 0010:icmp_unreach (net/ipv4/icmp.c:1085 net/ipv4/icmp.c:1143) Call Trace: <IRQ> icmp_rcv (net/ipv4/icmp.c:1527) ip_protocol_deliver_rcu (net/ipv4/ip_input.c:207) ip_local_deliver_finish (net/ipv4/ip_input.c:242) ip_local_deliver (net/ipv4/ip_input.c:262) ip_rcv (net/ipv4/ip_input.c:573) __netif_receive_skb_one_core (net/core/dev.c:6164) process_backlog (net/core/dev.c:6628) handle_softirqs (kernel/softirq.c:561) </IRQ> Add a NULL check before accessing icmp_strict_tag_validation. If the protocol has no registered handler, return false since it cannot perform strict tag validation.

Affected Products

VendorProductVersions
Linux kernelLinux kernel3.14, 6.1.167, 6.6.130, 6.12.78, 6.18.20, 6.19.10, 7.0-rc5

References

  • https://git.kernel.org/stable/c/1e4e2f5e48cec0cccaea9815fb9486c084ba41e2
  • https://git.kernel.org/stable/c/1f9f2c6d4b2a613b7756fc5679c5116ba2ca0161
  • https://git.kernel.org/stable/c/614aefe56af8e13331e50220c936fc0689cf5675
  • https://git.kernel.org/stable/c/9647e99d2a617c355d2b378be0ff6d0e848fd579
  • https://git.kernel.org/stable/c/b61529c357f1ee4d64836eb142a542d2e7ad67ce
  • https://git.kernel.org/stable/c/d938dd5a0ad780c891ea3bc94cae7405f11e618a

Related News (7 articles)

Tier B
BSI Advisories3h ago
[NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier B
BSI Advisories5d ago
[UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
→ No new info (linked only)
Tier B
BSI Advisories5d ago
[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier B
BSI Advisories5d ago
[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
→ No new info (linked only)
Tier B
CERT-FR8d ago
Multiples vulnérabilités dans les produits Microsoft (30 mars 2026)
→ No new info (linked only)
Tier A
Microsoft MSRC11d ago
CVE-2026-23398 icmp: fix NULL pointer dereference in icmp_tag_validation()
→ No new info (linked only)
Tier C
Linux Kernel CVEs12d ago
CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation()
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
CWECWE-476, CWE-400
PublishedMar 26, 2026
Last enriched5d agov2
Tags
denial of servicelocal attacklinux kernel
Trending Score40
Source articles7
Independent4
Info Completeness7/14
Missing: cvss, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-23407
apparmor: fix missing bounds check on DEFAULT table in verify_dfa()
Trending: 13
HIGHCVE-2026-23408
apparmor: Fix double free of ns_name in aa_replace_profiles()
Trending: 13
HIGHCVE-2026-23410
apparmor: fix race on rawdata dereference
Trending: 13
HIGHCVE-2026-23411
apparmor: fix race between freeing data and fs accessing it
Trending: 13
NONECVE-2026-23396
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix NULL deref in mesh_matches_local() mesh_matches_local() unconditionally dereferences ie->mesh_config to compar
Trending: 12

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Mar 26, 2026
Discovered by ZDM
Apr 1, 2026
Updated: vendor, product, affectedVersions
Apr 1, 2026

Version History

v2
Last enriched 5d ago
v2Tier C5d ago

Added vendor and product information, updated severity to HIGH, and included affected versions.

vendorproductaffectedVersions
via Linux Kernel CVEs
v15d ago

Initial creation