CVE-2026-23386
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2026
Last modified:
24/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL<br />
<br />
In DQ-QPL mode, gve_tx_clean_pending_packets() incorrectly uses the RDA<br />
buffer cleanup path. It iterates num_bufs times and attempts to unmap<br />
entries in the dma array.<br />
<br />
This leads to two issues:<br />
1. The dma array shares storage with tx_qpl_buf_ids (union).<br />
Interpreting buffer IDs as DMA addresses results in attempting to<br />
unmap incorrect memory locations.<br />
2. num_bufs in QPL mode (counting 2K chunks) can significantly exceed<br />
the size of the dma array, causing out-of-bounds access warnings<br />
(trace below is how we noticed this issue).<br />
<br />
UBSAN: array-index-out-of-bounds in<br />
drivers/net/ethernet/drivers/net/ethernet/google/gve/gve_tx_dqo.c:178:5 index 18 is out of<br />
range for type &#39;dma_addr_t[18]&#39; (aka &#39;unsigned long long[18]&#39;)<br />
Workqueue: gve gve_service_task [gve]<br />
Call Trace:<br />
<br />
dump_stack_lvl+0x33/0xa0<br />
__ubsan_handle_out_of_bounds+0xdc/0x110<br />
gve_tx_stop_ring_dqo+0x182/0x200 [gve]<br />
gve_close+0x1be/0x450 [gve]<br />
gve_reset+0x99/0x120 [gve]<br />
gve_service_task+0x61/0x100 [gve]<br />
process_scheduled_works+0x1e9/0x380<br />
<br />
Fix this by properly checking for QPL mode and delegating to<br />
gve_free_tx_qpl_bufs() to reclaim the buffers.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.1 (including) | 6.6.130 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.78 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/07e0c80e17ef781799e7cd5c41a7bf44f1bf6a5f
- https://git.kernel.org/stable/c/3744ebd8ffaa542ae8110fb449adcac0202f4cc8
- https://git.kernel.org/stable/c/71511dae56a75ce161aa746741e5c498feaea393
- https://git.kernel.org/stable/c/c171f90f58974c784db25e0606051541cb71b7f0
- https://git.kernel.org/stable/c/fb868db5f4bccd7a78219313ab2917429f715cea



