CVE-2026-23154
Segmentation Bug in Linux Kernel GSO Forwarding Causes Throughput Loss
Publication date: 2026-02-14
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.9 (exc) |
| linux | linux_kernel | From 5.6 (inc) to 6.12.69 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know
Can you explain this vulnerability to me?
This vulnerability is a bug in the Linux kernel's network code related to the segmentation of forwarding fraglist GRO (Generic Receive Offload) packets. Specifically, the function responsible for segmenting GRO packets containing a frag_list does not correctly handle packets that have undergone protocol translation (XLAT) between IPv4 and IPv6. XLAT only translates the header of the main skb (socket buffer), leaving the skbs in the frag_list untranslated, which causes protocol inconsistencies and reduces network throughput.
The fix involves setting a flag (SKB_GSO_DODGY) on GSO (Generic Segmentation Offload) packets that have been modified by protocol translation. This flag causes the segmentation code to avoid using the problematic skb_segment_list function and instead use a safer fallback method, ensuring that only fully translated packets are processed correctly. This resolves the protocol inconsistencies and improves throughput when forwarding GRO packets converted by XLAT.
How can this vulnerability impact me? :
This vulnerability can lead to reduced network throughput when a device forwards IPv4 packets through an IPv6-only upstream interface via hotspots or similar setups. The improper handling of fragmented GRO packets after protocol translation can cause protocol inconsistencies, which may degrade network performance and efficiency.