CVE-2026-23140
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/02/2026
Last modified:
14/02/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf, test_run: Subtract size of xdp_frame from allowed metadata size<br />
<br />
The xdp_frame structure takes up part of the XDP frame headroom,<br />
limiting the size of the metadata. However, in bpf_test_run, we don&#39;t<br />
take this into account, which makes it possible for userspace to supply<br />
a metadata size that is too large (taking up the entire headroom).<br />
<br />
If userspace supplies such a large metadata size in live packet mode,<br />
the xdp_update_frame_from_buff() call in xdp_test_run_init_page() call<br />
will fail, after which packet transmission proceeds with an<br />
uninitialised frame structure, leading to the usual Bad Stuff.<br />
<br />
The commit in the Fixes tag fixed a related bug where the second check<br />
in xdp_update_frame_from_buff() could fail, but did not add any<br />
additional constraints on the metadata size. Complete the fix by adding<br />
an additional check on the metadata size. Reorder the checks slightly to<br />
make the logic clearer and add a comment.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/31e37f44b60679d90b9f999c91371b15291be8e0
- https://git.kernel.org/stable/c/6447e697cfa8a43a8e491cb81bcc390d0f28f8ba
- https://git.kernel.org/stable/c/7c81ad5e580bd8441f8a521a8d34824ce6582ae5
- https://git.kernel.org/stable/c/e558cca217790286e799a8baacd1610bda31b261
- https://git.kernel.org/stable/c/e7440935063949d6f2c10f7328d960d0ff4bce90



