Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43086
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 07:40
Updated At-06 May, 2026 | 07:40
Rejected At-
▼CVE Numbering Authority (CNA)
ipvs: fix NULL deref in ip_vs_add_service error path

In the Linux kernel, the following vulnerability has been resolved: ipvs: fix NULL deref in ip_vs_add_service error path When ip_vs_bind_scheduler() succeeds in ip_vs_add_service(), the local variable sched is set to NULL. If ip_vs_start_estimator() subsequently fails, the out_err cleanup calls ip_vs_unbind_scheduler(svc, sched) with sched == NULL. ip_vs_unbind_scheduler() passes the cur_sched NULL check (because svc->scheduler was set by the successful bind) but then dereferences the NULL sched parameter at sched->done_service, causing a kernel panic at offset 0x30 from NULL. Oops: general protection fault, [..] [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] RIP: 0010:ip_vs_unbind_scheduler (net/netfilter/ipvs/ip_vs_sched.c:69) Call Trace: <TASK> ip_vs_add_service.isra.0 (net/netfilter/ipvs/ip_vs_ctl.c:1500) do_ip_vs_set_ctl (net/netfilter/ipvs/ip_vs_ctl.c:2809) nf_setsockopt (net/netfilter/nf_sockopt.c:102) [..] Fix by simply not clearing the local sched variable after a successful bind. ip_vs_unbind_scheduler() already detects whether a scheduler is installed via svc->scheduler, and keeping sched non-NULL ensures the error path passes the correct pointer to both ip_vs_unbind_scheduler() and ip_vs_scheduler_put(). While the bug is older, the problem popups in more recent kernels (6.2), when the new error path is taken after the ip_vs_start_estimator() call.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/netfilter/ipvs/ip_vs_ctl.c
Default Status
unaffected
Versions
Affected
  • From 705dd34440812735ece298eb5bc153fde9544d42 before 730663352c9178f33fcf5929f4a37c1f1ca5a693 (git)
  • From 705dd34440812735ece298eb5bc153fde9544d42 before 4039959315008888dd53c37674d33351817a5166 (git)
  • From 705dd34440812735ece298eb5bc153fde9544d42 before a32dabacee111cea083ddd57a03635672e1bff29 (git)
  • From 705dd34440812735ece298eb5bc153fde9544d42 before c2ddbe577e2ebf63f2d8fb15cdc7503af70f3e94 (git)
  • From 705dd34440812735ece298eb5bc153fde9544d42 before 9a91797e61d286805ae10a92cc48959c30800556 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/netfilter/ipvs/ip_vs_ctl.c
Default Status
affected
Versions
Affected
  • 6.2
Unaffected
  • From 0 before 6.2 (semver)
  • From 6.6.136 through 6.6.* (semver)
  • From 6.12.83 through 6.12.* (semver)
  • From 6.18.24 through 6.18.* (semver)
  • From 6.19.14 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/730663352c9178f33fcf5929f4a37c1f1ca5a693
N/A
https://git.kernel.org/stable/c/4039959315008888dd53c37674d33351817a5166
N/A
https://git.kernel.org/stable/c/a32dabacee111cea083ddd57a03635672e1bff29
N/A
https://git.kernel.org/stable/c/c2ddbe577e2ebf63f2d8fb15cdc7503af70f3e94
N/A
https://git.kernel.org/stable/c/9a91797e61d286805ae10a92cc48959c30800556
N/A
Hyperlink: https://git.kernel.org/stable/c/730663352c9178f33fcf5929f4a37c1f1ca5a693
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4039959315008888dd53c37674d33351817a5166
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a32dabacee111cea083ddd57a03635672e1bff29
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c2ddbe577e2ebf63f2d8fb15cdc7503af70f3e94
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9a91797e61d286805ae10a92cc48959c30800556
Resource: N/A
Details not found