CVE-2026-43093
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/05/2026
Last modified:
19/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xsk: tighten UMEM headroom validation to account for tailroom and min frame<br />
<br />
The current headroom validation in xdp_umem_reg() could leave us with<br />
insufficient space dedicated to even receive minimum-sized ethernet<br />
frame. Furthermore if multi-buffer would come to play then<br />
skb_shared_info stored at the end of XSK frame would be corrupted.<br />
<br />
HW typically works with 128-aligned sizes so let us provide this value<br />
as bare minimum.<br />
<br />
Multi-buffer setting is known later in the configuration process so<br />
besides accounting for 128 bytes, let us also take care of tailroom space<br />
upfront.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.118 (including) | 4.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.35 (including) | 5.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.6.7 (including) | 5.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7.1 (including) | 6.6.136 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.7:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.7:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0ec4d3f6e6934deb843b561ae048cd17218e5ad1
- https://git.kernel.org/stable/c/6523bc1b40e69301f24c14338b762af4739d6d39
- https://git.kernel.org/stable/c/9ea6ba4f3195dcba6e8b3e7b2e748593b7cafb12
- https://git.kernel.org/stable/c/a03975beb9f6af0d8ac051e30b2abeabe618414f
- https://git.kernel.org/stable/c/a315e022a72d95ef5f1d4e58e903cb492b0ad931



