CVE-2026-43284
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/05/2026
Última modificación:
08/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xfrm: esp: avoid in-place decrypt on shared skb frags<br />
<br />
MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP<br />
marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(),<br />
so later paths that may modify packet data can first make a private<br />
copy. The IPv4/IPv6 datagram append paths did not set this flag when<br />
splicing pages into UDP skbs.<br />
<br />
That leaves an ESP-in-UDP packet made from shared pipe pages looking<br />
like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW<br />
fast path for uncloned skbs without a frag_list and decrypts in place<br />
over data that is not owned privately by the skb.<br />
<br />
Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching<br />
TCP. Also make ESP input fall back to skb_cow_data() when the flag is<br />
present, so ESP does not decrypt externally backed frags in place.<br />
Private nonlinear skb frags still use the existing fast path.<br />
<br />
This intentionally does not change ESP output. In esp_output_head(),<br />
the path that appends the ESP trailer to existing skb tailroom without<br />
calling skb_cow_data() is not reachable for nonlinear skbs:<br />
skb_tailroom() returns zero when skb->data_len is nonzero, while ESP<br />
tailen is positive. Thus ESP output will either use the separate<br />
destination-frag path or fall back to skb_cow_data().
Impacto
Puntuación base 3.x
7.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.11 (incluyendo) | 5.10.255 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12 (incluyendo) | 5.15.205 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 6.1.171 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.138 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.87 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.28 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (incluyendo) | 7.0.5 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/50ed1e7873100f77abad20fd31c51029bc49cd03
- https://git.kernel.org/stable/c/52646cbd00e765a6db9c3afe9535f26218276034
- https://git.kernel.org/stable/c/5d55c7336f8032d434adcc5fab987ccc93a44aec
- https://git.kernel.org/stable/c/71a1d9d985d26716f74d21f18ee8cac821b06e97
- https://git.kernel.org/stable/c/8253aab4659ca16116b522203c2a6b18dccacea7
- https://git.kernel.org/stable/c/a6cb440f274a22456ef3e86b457344f1678f38f9
- https://git.kernel.org/stable/c/ab8b995323e5237041472d07e5055f5f7dcdf15b
- https://git.kernel.org/stable/c/b54edf1e9a3fd3491bdcb82a21f8d21315271e0d
- https://git.kernel.org/stable/c/fe785bb3a8096dffcc4048a85cd0c83337eeecad
- http://www.openwall.com/lists/oss-security/2026/05/08/7
- https://github.com/V4bel/dirtyfrag



