CVE-2026-23377

Source
https://cve.org/CVERecord?id=CVE-2026-23377
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23377.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23377
Downstream
Published
2026-03-25T10:27:57.338Z
Modified
2026-04-02T13:12:23.102540Z
Summary
ice: change XDP RxQ frag_size from DMA write length to xdp.frame_sz
Details

In the Linux kernel, the following vulnerability has been resolved:

ice: change XDP RxQ fragsize from DMA write length to xdp.framesz

The only user of fragsize field in XDP RxQ info is bpfxdpfragsincrease_tail(). It clearly expects whole buff size instead of DMA write size. Different assumptions in ice driver configuration lead to negative tailroom.

This allows to trigger kernel panic, when using XDPADJUSTTAILGROWMULTIBUFF xskxceiver test and changing packet size to 6912 and the requested offset to a huge value, e.g. XSKUMEM__MAXFRAMESIZE * 100.

Due to other quirks of the ZC configuration in ice, panic is not observed in ZC mode, but tailroom growing still fails when it should not.

Use fill queue buffer truesize instead of DMA write size in XDP RxQ info. Fix ZC mode too by using the new helper.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23377.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2fba7dc5157b6f85dbf1b8e26e63a724db1f3d79
Fixed
b0f05100e8795aadd1c0606bae9caefbda070d63
Fixed
e142dc4ef0f451b7ef99d09aaa84e9389af629d7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23377.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23377.json"