CVE-2026-43093
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
06/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xsk: tighten UMEM headroom validation to account for tailroom and min frame<br />
<br />
The current headroom validation in xdp_umem_reg() could leave us with<br />
insufficient space dedicated to even receive minimum-sized ethernet<br />
frame. Furthermore if multi-buffer would come to play then<br />
skb_shared_info stored at the end of XSK frame would be corrupted.<br />
<br />
HW typically works with 128-aligned sizes so let us provide this value<br />
as bare minimum.<br />
<br />
Multi-buffer setting is known later in the configuration process so<br />
besides accounting for 128 bytes, let us also take care of tailroom space<br />
upfront.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0ec4d3f6e6934deb843b561ae048cd17218e5ad1
- https://git.kernel.org/stable/c/6523bc1b40e69301f24c14338b762af4739d6d39
- https://git.kernel.org/stable/c/9ea6ba4f3195dcba6e8b3e7b2e748593b7cafb12
- https://git.kernel.org/stable/c/a03975beb9f6af0d8ac051e30b2abeabe618414f
- https://git.kernel.org/stable/c/a315e022a72d95ef5f1d4e58e903cb492b0ad931



