CVE-2026-43036

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2026
Last modified:
08/05/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: use skb_header_pointer() for TCPv4 GSO frag_off check<br /> <br /> Syzbot reported a KMSAN uninit-value warning in gso_features_check()<br /> called from netif_skb_features() [1].<br /> <br /> gso_features_check() reads iph-&gt;frag_off to decide whether to clear<br /> mangleid_features. Accessing the IPv4 header via ip_hdr()/inner_ip_hdr()<br /> can rely on skb header offsets that are not always safe for direct<br /> dereference on packets injected from PF_PACKET paths.<br /> <br /> Use skb_header_pointer() for the TCPv4 frag_off check so the header read<br /> is robust whether data is already linear or needs copying.<br /> <br /> [1] https://syzkaller.appspot.com/bug?extid=1543a7d954d9c6d00407

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.7 (including) 6.12.81 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.18.22 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.19 (including) 6.19.12 (excluding)
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*