CVE-2026-23254
In the Linux kernel, the following vulnerability has been resolved:
net: gro: fix outer network offset
The udp GRO complete stage assumes that all the packets inserted the RX
have the `encapsulation` flag zeroed. Such assumption is not true, as a
few H/W NICs can set such flag when H/W offloading the checksum for
an UDP encapsulated traffic, the tun driver can inject GSO packets with
UDP encapsulation and the problematic layout can also be created via
a veth based setup.
Due to the above, in the problematic scenarios, udp4_gro_complete() uses
the wrong network offset (inner instead of outer) to compute the outer
UDP header pseudo checksum, leading to csum validation errors later on
in packet processing.
Address the issue always clearing the encapsulation flag at GRO completion
time. Such flag will be set again as needed for encapsulated packets by
udp_gro_complete().
https://nvd.nist.gov/vuln/detail/CVE-2026-23254
Categories
No category defined
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67
AFFECTED (from MITRE)
| Vendor |
Product |
Versions |
| Linux |
Linux |
- af276a5ac8e938c8b058e3e124073cc1e322d98b < 9d40a85138568696387ef04cd004c64612a70874 [affected]
- 5ef31ea5d053a8f493a772ebad3f3ce82c35d845 < b83557bc6f560433fe5d727e241069f8db5ba709 [affected]
- 5ef31ea5d053a8f493a772ebad3f3ce82c35d845 < 2e5edb69e5d0e23ef248c56fc977039268c77a7b [affected]
- 5ef31ea5d053a8f493a772ebad3f3ce82c35d845 < 5c2c3c38be396257a6a2e55bd601a12bb9781507 [affected]
- dbd9466d323a72e22efe09151253d195d36d3bf6 [affected]
|
| Linux |
Linux |
- 6.9 [affected]
- < 6.9 [unaffected]
- 6.6.124 ≤ 6.6.* [unaffected]
- 6.12.70 ≤ 6.12.* [unaffected]
- 6.18.10 ≤ 6.18.* [unaffected]
- 6.19 ≤ * [unaffected]
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
CPE
| cpe |
start |
end |
| Configuration 1 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.6.31 |
< 6.6.124 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.9 |
< 6.12.70 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.9 |
< 6.18.10 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.9 |
< 6.19 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.8.10 |
|
REMEDIATION
EXPLOITS
Exploit-db.com
| id |
description |
date |
|
| No known exploits |
POC Github
Other Nist (github, ...)
CAPEC
Common Attack Pattern Enumerations and Classifications
| id |
description |
severity |
| No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
Discover this offer