CVE-2026-43194
TCP GRO Test Stall Due to Xmit Error Handling in Linux Kernel
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves how transmission (xmit) errors of Generic Segmentation Offload (GSO) frames are handled, particularly with the veth device used in network testing. When a packet segment is lost, the sender incorrectly interprets the loss as if the entire GSO super frame was lost, causing the TCP connection to become stuck. This happens because the return codes from the network device do not accurately reflect partial segment loss, leading to a mismatch between what the sender believes was sent and what the receiver acknowledges.
The root cause is that veth returns an error when it cannot transmit a frame, but TCP only sees the last return code for the last segment of the GSO frame. This causes TCP to reject acknowledgments for data it thinks was never sent, resulting in a stalled connection. The issue is exacerbated in setups without a queuing discipline (Qdisc), which normally isolates protocol layers from device errors.
Several fixes were considered, including changing how veth reports errors, adjusting return codes, or making TCP ignore these errors. The chosen fix was to ignore the return codes in the Qdisc-less GSO case, as they are unreliable, preventing the connection from getting stuck.
How can this vulnerability impact me? :
This vulnerability can cause TCP connections to become stuck or stalled after packet loss events, leading to network communication failures or degraded performance. Specifically, the sender may stop advancing its send pointer due to misinterpreted transmission errors, resulting in stalled data transmission and potentially causing network applications relying on TCP to hang or timeout.
The impact is particularly relevant in environments using virtual Ethernet devices (veth) or setups without queuing disciplines, where this error handling flaw can manifest. This can affect network reliability and stability, especially in testing or simulation scenarios that rely on these configurations.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is related to how the Linux kernel handles transmit errors of GSO frames, especially in setups without a Qdisc. Immediate mitigation involves applying the fix that ignores the return code in the Qdisc-less+GSO case, since it is unreliable.
- Apply the kernel patch that masks GSO errors in Qdisc-less setups.
- Avoid using devices or configurations without a Qdisc layer where possible.
- Consider disabling or adjusting veth device behavior to not return errors on lost packets.