Description
In the Linux kernel, the following vulnerability has been resolved:

net: use skb_header_pointer() for TCPv4 GSO frag_off check

Syzbot reported a KMSAN uninit-value warning in gso_features_check()
called from netif_skb_features() [1].

gso_features_check() reads iph->frag_off to decide whether to clear
mangleid_features. Accessing the IPv4 header via ip_hdr()/inner_ip_hdr()
can rely on skb header offsets that are not always safe for direct
dereference on packets injected from PF_PACKET paths.

Use skb_header_pointer() for the TCPv4 frag_off check so the header read
is robust whether data is already linear or needs copying.

[1] https://syzkaller.appspot.com/bug?extid=1543a7d954d9c6d00407
Published: 2026-05-01
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The kernel incorrectly reads the IPv4 fragment offset field (frag_off) from packets received via the PF_PACKET path using a direct memory dereference. Because the packet header may not be linear, this can cause the kernel to read uninitialized or invalid memory, triggering a KMSAN uninitialized‑value warning or a kernel fault. The unsafe header access may corrupt kernel memory or lead to a crash, resulting in loss of service or system instability.

Affected Systems

All Linux kernel builds released before the commit that switches the frag_off check to skb_header_pointer(). The vulnerability affects every distribution or custom kernel running the affected kernel version, regardless of configuration.

Risk and Exploitability

The CVSS score of 5.5 classifies this issue as medium severity. Because there is no EPSS score or KEV listing, the exact likelihood of exploitation remains unclear. The likely attack vector would involve injecting crafted packets with the PF_PACKET socket, which usually requires CAP_NET_RAW or root privileges. An attacker with such privileges could trigger the unsafe header read, potentially causing a kernel fault and system instability.

Generated by OpenCVE AI on May 2, 2026 at 07:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel patch that introduces skb_header_pointer() for TCPv4 GSO frag_off checks
  • Reboot the system immediately after the patch to ensure all running processes use the updated kernel
  • If the patch is not yet available, restrict PF_PACKET traffic to trusted users or block it entirely on untrusted hosts

Generated by OpenCVE AI on May 2, 2026 at 07:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-824
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: use skb_header_pointer() for TCPv4 GSO frag_off check Syzbot reported a KMSAN uninit-value warning in gso_features_check() called from netif_skb_features() [1]. gso_features_check() reads iph->frag_off to decide whether to clear mangleid_features. Accessing the IPv4 header via ip_hdr()/inner_ip_hdr() can rely on skb header offsets that are not always safe for direct dereference on packets injected from PF_PACKET paths. Use skb_header_pointer() for the TCPv4 frag_off check so the header read is robust whether data is already linear or needs copying. [1] https://syzkaller.appspot.com/bug?extid=1543a7d954d9c6d00407
Title net: use skb_header_pointer() for TCPv4 GSO frag_off check
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:15:34.640Z

Reserved: 2026-05-01T14:12:55.977Z

Link: CVE-2026-43036

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:48.273

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-43036

cve-icon Redhat

Severity : Low

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-43036 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T07:15:16Z

Weaknesses