CVE-2026-43092 (GCVE-0-2026-43092)
Vulnerability from cvelistv5 – Published: 2026-05-06 07:40 – Updated: 2026-05-06 07:40
VLAI?
Title
xsk: validate MTU against usable frame size on bind
Summary
In the Linux kernel, the following vulnerability has been resolved:
xsk: validate MTU against usable frame size on bind
AF_XDP bind currently accepts zero-copy pool configurations without
verifying that the device MTU fits into the usable frame space provided
by the UMEM chunk.
This becomes a problem since we started to respect tailroom which is
subtracted from chunk_size (among with headroom). 2k chunk size might
not provide enough space for standard 1500 MTU, so let us catch such
settings at bind time. Furthermore, validate whether underlying HW will
be able to satisfy configured MTU wrt XSK's frame size multiplied by
supported Rx buffer chain length (that is exposed via
net_device::xdp_zc_max_segs).
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
24ea50127ecf0efe819c1f6230add27abc6ca9d9 , < a55793e5a97d4e39bdb380873a9780fe0010bff6
(git)
Affected: 24ea50127ecf0efe819c1f6230add27abc6ca9d9 , < f669d60db11dbabb96279f2b20f9d1cba43cddb2 (git) Affected: 24ea50127ecf0efe819c1f6230add27abc6ca9d9 , < 25e1e91a8da819924df0b16e3812d7b24c8ce133 (git) Affected: 24ea50127ecf0efe819c1f6230add27abc6ca9d9 , < b2f4daa6422fd6cc0cec969794dab4a88ea4cea1 (git) Affected: 24ea50127ecf0efe819c1f6230add27abc6ca9d9 , < 36ee60b569ba0dfb6f961333b90d19ab5b323fa9 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/xdp/xsk_buff_pool.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "a55793e5a97d4e39bdb380873a9780fe0010bff6",
"status": "affected",
"version": "24ea50127ecf0efe819c1f6230add27abc6ca9d9",
"versionType": "git"
},
{
"lessThan": "f669d60db11dbabb96279f2b20f9d1cba43cddb2",
"status": "affected",
"version": "24ea50127ecf0efe819c1f6230add27abc6ca9d9",
"versionType": "git"
},
{
"lessThan": "25e1e91a8da819924df0b16e3812d7b24c8ce133",
"status": "affected",
"version": "24ea50127ecf0efe819c1f6230add27abc6ca9d9",
"versionType": "git"
},
{
"lessThan": "b2f4daa6422fd6cc0cec969794dab4a88ea4cea1",
"status": "affected",
"version": "24ea50127ecf0efe819c1f6230add27abc6ca9d9",
"versionType": "git"
},
{
"lessThan": "36ee60b569ba0dfb6f961333b90d19ab5b323fa9",
"status": "affected",
"version": "24ea50127ecf0efe819c1f6230add27abc6ca9d9",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"net/xdp/xsk_buff_pool.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.6"
},
{
"lessThan": "6.6",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.136",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.83",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.24",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.14",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.136",
"versionStartIncluding": "6.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.83",
"versionStartIncluding": "6.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.24",
"versionStartIncluding": "6.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.14",
"versionStartIncluding": "6.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"versionStartIncluding": "6.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: validate MTU against usable frame size on bind\n\nAF_XDP bind currently accepts zero-copy pool configurations without\nverifying that the device MTU fits into the usable frame space provided\nby the UMEM chunk.\n\nThis becomes a problem since we started to respect tailroom which is\nsubtracted from chunk_size (among with headroom). 2k chunk size might\nnot provide enough space for standard 1500 MTU, so let us catch such\nsettings at bind time. Furthermore, validate whether underlying HW will\nbe able to satisfy configured MTU wrt XSK\u0027s frame size multiplied by\nsupported Rx buffer chain length (that is exposed via\nnet_device::xdp_zc_max_segs)."
}
],
"providerMetadata": {
"dateUpdated": "2026-05-06T07:40:24.619Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/a55793e5a97d4e39bdb380873a9780fe0010bff6"
},
{
"url": "https://git.kernel.org/stable/c/f669d60db11dbabb96279f2b20f9d1cba43cddb2"
},
{
"url": "https://git.kernel.org/stable/c/25e1e91a8da819924df0b16e3812d7b24c8ce133"
},
{
"url": "https://git.kernel.org/stable/c/b2f4daa6422fd6cc0cec969794dab4a88ea4cea1"
},
{
"url": "https://git.kernel.org/stable/c/36ee60b569ba0dfb6f961333b90d19ab5b323fa9"
}
],
"title": "xsk: validate MTU against usable frame size on bind",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-43092",
"datePublished": "2026-05-06T07:40:24.619Z",
"dateReserved": "2026-05-01T14:12:55.984Z",
"dateUpdated": "2026-05-06T07:40:24.619Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-43092",
"date": "2026-05-09",
"epss": "0.00018",
"percentile": "0.04917"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-43092\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-06T10:16:22.550\",\"lastModified\":\"2026-05-06T13:08:07.970\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nxsk: validate MTU against usable frame size on bind\\n\\nAF_XDP bind currently accepts zero-copy pool configurations without\\nverifying that the device MTU fits into the usable frame space provided\\nby the UMEM chunk.\\n\\nThis becomes a problem since we started to respect tailroom which is\\nsubtracted from chunk_size (among with headroom). 2k chunk size might\\nnot provide enough space for standard 1500 MTU, so let us catch such\\nsettings at bind time. Furthermore, validate whether underlying HW will\\nbe able to satisfy configured MTU wrt XSK\u0027s frame size multiplied by\\nsupported Rx buffer chain length (that is exposed via\\nnet_device::xdp_zc_max_segs).\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/25e1e91a8da819924df0b16e3812d7b24c8ce133\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/36ee60b569ba0dfb6f961333b90d19ab5b323fa9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a55793e5a97d4e39bdb380873a9780fe0010bff6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b2f4daa6422fd6cc0cec969794dab4a88ea4cea1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f669d60db11dbabb96279f2b20f9d1cba43cddb2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…