CVE-2026-22988
Description
In the Linux kernel, the following vulnerability has been resolved:
arp: do not assume dev_hard_header() does not change skb->head
arp_create() is the only dev_hard_header() caller making assumption about skb->head being unchanged.
A recent commit broke this assumption.
Initialize @arp pointer after dev_hard_header() call.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free in Linux kernel ARP due to dev_hard_header() changing skb->head, fixed by reinitialize arp pointer after call.
Vulnerability
In the Linux kernel's ARP implementation, the arp_create() function assumed that dev_hard_header() would not modify the skb->head pointer. A recent change to dev_hard_header() broke this assumption, causing the arp pointer (struct arphdr *) pointer, which was set before the call, to become stale if skb->head` was reallocated. This leads to a use-after-free or memory corruption when the stale pointer is dereferenced [1][2][3].
Exploitation
An attacker would need to trigger ARP packet creation in a context where dev_hard_header() causes a reallocation of the skb headroom. This could be achieved by sending crafted network traffic that forces the kernel to generate an ARP reply or request, potentially from a local network position. No special privileges are required beyond the ability to send packets to the target system [1][2].
Impact
Successful exploitation could allow an attacker to corrupt kernel memory, leading to a denial of service (system crash) or potentially arbitrary code execution with kernel privileges. The vulnerability is rated High with a CVSS v3 score of 7.8, indicating significant impact on confidentiality, integrity, and availability [1][2][3].
Mitigation
The fix is included in the Linux kernel stable updates. Users should apply the latest kernel patches from their distribution. The commit identifiers are 393525dee5c3, 949647e7771a, and 029935507d0a [1][2][3]. No workaround is available; patching is required.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
5cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.12.64,<6.12.66
- cpe:2.3:o:linux:linux_kernel:6.1.160:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.6.120:*:*:*:*:*:*:*
- (no CPE)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/029935507d0af6553c45380fbf6feecf756fd226nvdPatch
- git.kernel.org/stable/c/393525dee5c39acff8d6705275d7fcaabcfb7f0anvdPatch
- git.kernel.org/stable/c/70bddc16491ef4681f3569b3a2c80309a3edcdd1nvdPatch
- git.kernel.org/stable/c/949647e7771a4a01963fe953a96d81fba7acecf3nvdPatch
- git.kernel.org/stable/c/c92510f5e3f82ba11c95991824a41e59a9c5ed81nvdPatch
- git.kernel.org/stable/c/dd6ccec088adff4bdf33e2b2dd102df20a7128fanvdPatch
- git.kernel.org/stable/c/e432dbff342b95fe44645f9a90fcf333c80f4b5envdPatch
News mentions
0No linked articles in our index yet.