SB20260325104 - Integer overflow in Linux kernel core
Published: March 25, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Integer overflow (CVE-ID: CVE-2026-23343)
The vulnerability allows a local user to execute arbitrary code or cause a denial of service due to memory corruption.
The vulnerability exists due to improper input validation in the XDP (eXpress Data Path) subsystem when handling packet tailroom calculations. A local user can trigger a negative tailroom value that is interpreted as a large unsigned integer, leading to out-of-bounds memory access during XDP frame processing.
The issue arises when Ethernet drivers report fragment sizes smaller than the actual truesize, causing incorrect tailroom computation in functions such as bpf_xdp_frags_increase_tail().
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/01379540452a02bbc52f639d45dd365cd3624efb
- https://git.kernel.org/stable/c/8821e857759be9db3cde337ad328b71fe5c8a55f
- https://git.kernel.org/stable/c/94b9da7e9f958cb3d115b21eff824ecd8c3217aa
- https://git.kernel.org/stable/c/98cd8b4d0b836d3edf70161f40efd9cbb8c8f252
- https://git.kernel.org/stable/c/a0fb59f527d03c60b2cd547cfae4a842ad84670f
- https://git.kernel.org/stable/c/c7c790a07697148c41e2d03eb28efe132adda749