CVE-2026-23326

HIGH

xsk: Fix fragment node deletion to prevent buffer leak

Title source: cna
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: xsk: Fix fragment node deletion to prevent buffer leak After commit b692bf9a7543 ("xsk: Get rid of xdp_buff_xsk::xskb_list_node"), the list_node field is reused for both the xskb pool list and the buffer free list, this causes a buffer leak as described below. xp_free() checks if a buffer is already on the free list using list_empty(&xskb->list_node). When list_del() is used to remove a node from the xskb pool list, it doesn't reinitialize the node pointers. This means list_empty() will return false even after the node has been removed, causing xp_free() to incorrectly skip adding the buffer to the free list. Fix this by using list_del_init() instead of list_del() in all fragment handling paths, this ensures the list node is reinitialized after removal, allowing the list_empty() to work correctly.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 3.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-787
Status published
Products (16)
linux/Kernel 6.13.0 - 6.18.17linux
linux/Kernel 6.19.0 - 6.19.7linux
Linux/Linux < 6.13
Linux/Linux 560c974b7ccd95bb9ff20df77f6654283e45c9c6 - 5172adf9efb8298a52f4dcdc3f98d4d9d1e06a6d
Linux/Linux 6.13
Linux/Linux 6.18.17 - 6.18.*
Linux/Linux 6.19.7 - 6.19.*
Linux/Linux 7.0
Linux/Linux 7.0-rc3
Linux/Linux b692bf9a7543af7ad11a59d182a3757578f0ba53 - 60abb0ac11dccd6b98fd9182bc5f85b621688861
... and 6 more
Published Mar 25, 2026
Tracked Since Mar 25, 2026