CVE-2026-43092
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
06/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xsk: validate MTU against usable frame size on bind<br />
<br />
AF_XDP bind currently accepts zero-copy pool configurations without<br />
verifying that the device MTU fits into the usable frame space provided<br />
by the UMEM chunk.<br />
<br />
This becomes a problem since we started to respect tailroom which is<br />
subtracted from chunk_size (among with headroom). 2k chunk size might<br />
not provide enough space for standard 1500 MTU, so let us catch such<br />
settings at bind time. Furthermore, validate whether underlying HW will<br />
be able to satisfy configured MTU wrt XSK&#39;s frame size multiplied by<br />
supported Rx buffer chain length (that is exposed via<br />
net_device::xdp_zc_max_segs).
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/25e1e91a8da819924df0b16e3812d7b24c8ce133
- https://git.kernel.org/stable/c/36ee60b569ba0dfb6f961333b90d19ab5b323fa9
- https://git.kernel.org/stable/c/a55793e5a97d4e39bdb380873a9780fe0010bff6
- https://git.kernel.org/stable/c/b2f4daa6422fd6cc0cec969794dab4a88ea4cea1
- https://git.kernel.org/stable/c/f669d60db11dbabb96279f2b20f9d1cba43cddb2



