-

CVE-2026-23254

net: gro: fix outer network offset

In the Linux kernel, the following vulnerability has been resolved:

net: gro: fix outer network offset

The udp GRO complete stage assumes that all the packets inserted the RX
have the `encapsulation` flag zeroed. Such assumption is not true, as a
few H/W NICs can set such flag when H/W offloading the checksum for
an UDP encapsulated traffic, the tun driver can inject GSO packets with
UDP encapsulation and the problematic layout can also be created via
a veth based setup.

Due to the above, in the problematic scenarios, udp4_gro_complete() uses
the wrong network offset (inner instead of outer) to compute the outer
UDP header pseudo checksum, leading to csum validation errors later on
in packet processing.

Address the issue always clearing the encapsulation flag at GRO completion
time. Such flag will be set again as needed for encapsulated packets by
udp_gro_complete().
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version af276a5ac8e938c8b058e3e124073cc1e322d98b
Version < 9d40a85138568696387ef04cd004c64612a70874
Status affected
Version 5ef31ea5d053a8f493a772ebad3f3ce82c35d845
Version < b83557bc6f560433fe5d727e241069f8db5ba709
Status affected
Version 5ef31ea5d053a8f493a772ebad3f3ce82c35d845
Version < 2e5edb69e5d0e23ef248c56fc977039268c77a7b
Status affected
Version 5ef31ea5d053a8f493a772ebad3f3ce82c35d845
Version < 5c2c3c38be396257a6a2e55bd601a12bb9781507
Status affected
Version dbd9466d323a72e22efe09151253d195d36d3bf6
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 6.9
Status affected
Version 0
Version < 6.9
Status unaffected
Version <= 6.6.*
Version 6.6.124
Status unaffected
Version <= 6.12.*
Version 6.12.70
Status unaffected
Version <= 6.18.*
Version 6.18.10
Status unaffected
Version <= *
Version 6.19
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.071
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.