In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix reference count leak in bpf_prog_test_run_xdp()
syzbot is reporting
unregister_netdevice: waiting for sit0 to become free. Usage count = 2
problem. A debug printk() patch found that a refcount is obtained at
xdp_convert_md_to_buff() from bpf_prog_test_run_xdp().
According to commit ec94670fcb3b ("bpf: Support specifying ingress via
xdp_md context in BPF_PROG_TEST_RUN"), the refcount obtained by
xdp_convert_md_to_buff() will be released by xdp_convert_buff_to_md().
Therefore, we can consider that the error handling path introduced by
commit 1c1949982524 ("bpf: introduce frags support to
bpf_prog_test_run_xdp()") forgot to call xdp_convert_buff_to_md().
References
Configurations
Configuration 1 (hide)
|
History
26 Feb 2026, 17:19
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-Other | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/368569bc546d3368ee9980ba79fc42fdff9a3365 - Patch | |
| References | () https://git.kernel.org/stable/c/737be05a765761d7d7c9f7fe92274bd8e6f6951e - Patch | |
| References | () https://git.kernel.org/stable/c/98676ee71fd4eafeb8be63c7f3f1905d40e03101 - Patch | |
| References | () https://git.kernel.org/stable/c/ec69daabe45256f98ac86c651b8ad1b2574489a7 - Patch | |
| References | () https://git.kernel.org/stable/c/fb9ef40cccdbacce36029b305d0ef1e12e4fea38 - Patch |
23 Jan 2026, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-23 16:15
Updated : 2026-02-26 17:19
NVD link : CVE-2026-22994
Mitre link : CVE-2026-22994
CVE.ORG link : CVE-2026-22994
JSON object : View
Products Affected
linux
- linux_kernel
CWE
