CVE-2026-43057
Linux Kernel IPv6 Checksum GSO Fallback Vulnerability
Publication date: 2026-05-01
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.19 (inc) to 6.19.12 (exc) |
| linux | linux_kernel | From 6.1.149 (inc) to 6.1.168 (exc) |
| linux | linux_kernel | From 6.12.44 (inc) to 6.12.81 (exc) |
| linux | linux_kernel | From 6.16.4 (inc) to 6.17 (exc) |
| linux | linux_kernel | From 6.6.103 (inc) to 6.6.134 (exc) |
| linux | linux_kernel | From 6.17.1 (exc) to 6.18.22 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability relates to how the Linux kernel handles tunneled IPv6 traffic with checksum offloading and segmentation offloading features. Specifically, the kernel did not correctly handle packets with IPv6 extension headers during checksum offload, which requires software fallback for such packets. The issue was that the kernel only checked the outer network header length, but for tunneled packets, it must check the inner header length instead. Additionally, special cases like tunneled packets without an inner IP protocol (e.g., RFC 6951 SCTP in UDP) were not properly handled and needed to revert to software processing. The vulnerability was fixed by introducing a fallback mechanism that correctly checks the inner header length and ensures proper software handling of these special tunneled packets.
How can this vulnerability impact me? :
If this vulnerability is present, tunneled IPv6 packets with extension headers or special inner protocols might not be processed correctly by the kernel's checksum and segmentation offloading mechanisms. This could lead to incorrect packet handling, potentially causing network communication issues such as dropped or corrupted packets, degraded network performance, or unexpected behavior in applications relying on tunneled IPv6 traffic.