CVE-2026-23140
Metadata Size Validation Flaw in Linux Kernel XDP Frame Handling
Publication date: 2026-02-14
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.18 (inc) to 6.1.161 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.6 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.121 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.66 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's handling of XDP (eXpress Data Path) frames within the bpf_test_run function. Specifically, the size of the xdp_frame structure, which occupies part of the XDP frame headroom, was not properly accounted for when userspace supplied metadata size. This oversight allowed userspace to specify a metadata size that was too large, potentially consuming the entire headroom.
When such an oversized metadata size is supplied in live packet mode, a function call (xdp_update_frame_from_buff) fails, but packet transmission continues using an uninitialized frame structure. This can lead to unpredictable and potentially harmful behavior.
The fix involved adding an additional check on the metadata size and reordering the validation logic to prevent this condition.
How can this vulnerability impact me? :
This vulnerability can lead to packet transmission using uninitialized frame structures, which may cause unpredictable behavior in the kernel's packet processing. Such behavior could result in system instability, crashes, or potentially allow malicious userspace processes to cause denial of service or other unintended effects.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know