CVE-2026-22988Expired Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 23

Description

In the Linux kernel, the following vulnerability has been resolved: arp: do not assume dev_hard_header() does not change skb->head arp_create() is the only dev_hard_header() caller making assumption about skb->head being unchanged. A recent commit broke this assumption. Initialize @arp pointer after dev_hard_header() call.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.12.646.12.66+4
Debianlinux/linux_kernel< 6.18.8-1
CVEListV5linux/linux17e7386234f740f3e7d5e58a47b5847ea34c3bc2e432dbff342b95fe44645f9a90fcf333c80f4b5e+10
debiandebian/linux< linux 6.18.8-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
CVE-2026-22988: In the Linux kernel, the following vulnerability has been resolved: arp: do not assume dev_hard_header() does not change skb->head arp_create() is the2026-01-23
GHSA
GHSA-5fwh-qcfv-38cc: In the Linux kernel, the following vulnerability has been resolved: arp: do not assume dev_hard_header() does not change skb->head arp_create() is t2026-01-23

📋Vendor Advisories

2
Red Hat
kernel: arp: do not assume dev_hard_header() does not change skb->head2026-01-23
Debian
CVE-2026-22988: linux - In the Linux kernel, the following vulnerability has been resolved: arp: do not...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-22988 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-22988 — Expired Pointer Dereference in Linux | cvebase