CVE-2026-23083

In the Linux kernel, the following vulnerability has been resolved: fou: Don't allow 0 for FOU_ATTR_IPPROTO. fou_udp_recv() has the same problem mentioned in the previous patch. If FOU_ATTR_IPPROTO is set to 0, skb is not freed by fou_udp_recv() nor "resubmit"-ted in ip_protocol_deliver_rcu(). Let's forbid 0 for FOU_ATTR_IPPROTO.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*

History

18 Mar 2026, 13:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: fou: No permitir 0 para FOU_ATTR_IPPROTO. fou_udp_recv() tiene el mismo problema mencionado en el parche anterior. Si FOU_ATTR_IPPROTO se establece en 0, skb no es liberado por fou_udp_recv() ni 'reenviado' en ip_protocol_deliver_rcu(). Prohibamos 0 para FOU_ATTR_IPPROTO.
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/1cc98b8887cabb1808d2f4a37cd10a7be7574771 - () https://git.kernel.org/stable/c/1cc98b8887cabb1808d2f4a37cd10a7be7574771 - Patch
References () https://git.kernel.org/stable/c/611ef4bd9c73d9e6d87bed57a635ff1fdd8c91ea - () https://git.kernel.org/stable/c/611ef4bd9c73d9e6d87bed57a635ff1fdd8c91ea - Patch
References () https://git.kernel.org/stable/c/6e983789b7588ee59cbf303583546c043bad8e19 - () https://git.kernel.org/stable/c/6e983789b7588ee59cbf303583546c043bad8e19 - Patch
References () https://git.kernel.org/stable/c/7a9bc9e3f42391e4c187e099263cf7a1c4b69ff5 - () https://git.kernel.org/stable/c/7a9bc9e3f42391e4c187e099263cf7a1c4b69ff5 - Patch
References () https://git.kernel.org/stable/c/9b75dff8446ec871030d8daf5a69e74f5fe8b956 - () https://git.kernel.org/stable/c/9b75dff8446ec871030d8daf5a69e74f5fe8b956 - Patch
References () https://git.kernel.org/stable/c/b7db31a52c3862a1a32202a273a4c32e7f5f4823 - () https://git.kernel.org/stable/c/b7db31a52c3862a1a32202a273a4c32e7f5f4823 - Patch
References () https://git.kernel.org/stable/c/c7498f9bc390479ccfad7c7f2332237ff4945b03 - () https://git.kernel.org/stable/c/c7498f9bc390479ccfad7c7f2332237ff4945b03 - Patch

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/611ef4bd9c73d9e6d87bed57a635ff1fdd8c91ea -
  • () https://git.kernel.org/stable/c/6e983789b7588ee59cbf303583546c043bad8e19 -
  • () https://git.kernel.org/stable/c/c7498f9bc390479ccfad7c7f2332237ff4945b03 -

04 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 17:16

Updated : 2026-03-18 13:40


NVD link : CVE-2026-23083

Mitre link : CVE-2026-23083

CVE.ORG link : CVE-2026-23083


JSON object : View

Products Affected

linux

  • linux_kernel