PT-2026-42878 · Linux · Linux
Published
2026-05-23
·
Updated
2026-05-23
·
CVE-2026-43503
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
net: skbuff: preserve shared-frag marker during coalescing
skb try coalesce() can attach paged frags from @from to @to. If @from
has SKBFL SHARED FRAG set, the resulting @to skb can contain the same
externally-owned or page-cache-backed frags, but the shared-frag marker
is currently lost.
That breaks the invariant relied on by later in-place writers. In
particular, ESP input checks skb has shared frag() before deciding
whether an uncloned nonlinear skb can skip skb cow data(). If TCP
receive coalescing has moved shared frags into an unmarked skb, ESP can
see skb has shared frag() as false and decrypt in place over page-cache
backed frags.
Propagate SKBFL SHARED FRAG when skb try coalesce() transfers paged
frags. The tailroom copy path does not need the marker because it copies
bytes into @to's linear data rather than transferring frag descriptors.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux