CVE-2026-43503

net: skbuff: preserve shared-frag marker during coalescing

Title source: cna
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: net: skbuff: preserve shared-frag marker during coalescing skb_try_coalesce() can attach paged frags from @from to @to. If @from has SKBFL_SHARED_FRAG set, the resulting @to skb can contain the same externally-owned or page-cache-backed frags, but the shared-frag marker is currently lost. That breaks the invariant relied on by later in-place writers. In particular, ESP input checks skb_has_shared_frag() before deciding whether an uncloned nonlinear skb can skip skb_cow_data(). If TCP receive coalescing has moved shared frags into an unmarked skb, ESP can see skb_has_shared_frag() as false and decrypt in place over page-cache backed frags. Propagate SKBFL_SHARED_FRAG when skb_try_coalesce() transfers paged frags. The tailroom copy path does not need the marker because it copies bytes into @to's linear data rather than transferring frag descriptors.

Scores

EPSS 0.0002
EPSS Percentile 7.2%

Details

Status published
Products (23)
Linux/Linux < 3.9
Linux/Linux 3.9
Linux/Linux 5.10.257 - 5.10.*
Linux/Linux 5.15.208 - 5.15.*
Linux/Linux 6.1.174 - 6.1.*
Linux/Linux 6.12.91 - 6.12.*
Linux/Linux 6.18.33 - 6.18.*
Linux/Linux 6.6.141 - 6.6.*
Linux/Linux 7.0.10 - 7.0.*
Linux/Linux cef401de7be8c4e155c6746bfccf721a4fa5fab9 - 12401fcfb01f53ccc63ab0a3246570fe8f3105ee
... and 13 more
Published May 23, 2026
Tracked Since May 23, 2026