CVE-2026-22981NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 23

Description

In the Linux kernel, the following vulnerability has been resolved: idpf: detach and close netdevs while handling a reset Protect the reset path from callbacks by setting the netdevs to detached state and close any netdevs in UP state until the reset handling has completed. During a reset, the driver will de-allocate resources for the vport, and there is no guarantee that those will recover, which is why the existing vport_ctrl_lock does not provide sufficient protection. idpf_detach_and_clos

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.76.18.6+1
Debianlinux/linux_kernel< 6.18.8-1
CVEListV5linux/linux0fe45467a1041ea3657a7fa3a791c84c104fbd349ad3d0836d8bc1a0f0b4bf56efc56312a9e64b97+3
debiandebian/linux< linux 6.18.8-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
CVE-2026-22981: In the Linux kernel, the following vulnerability has been resolved: idpf: detach and close netdevs while handling a reset Protect the reset path from2026-01-23
GHSA
GHSA-8p5m-xghc-7954: In the Linux kernel, the following vulnerability has been resolved: idpf: detach and close netdevs while handling a reset Protect the reset path fro2026-01-23

📋Vendor Advisories

2
Red Hat
kernel: idpf: detach and close netdevs while handling a reset2026-01-23
Debian
CVE-2026-22981: linux - In the Linux kernel, the following vulnerability has been resolved: idpf: detac...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-22981 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-22981 — NULL Pointer Dereference in Linux | cvebase