CVE-2026-23377 — Incorrect Calculation of Buffer Size in Linux
Severity
7.1HIGH
No vectorEPSS
0.0%
top 93.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
ice: change XDP RxQ frag_size from DMA write length to xdp.frame_sz
The only user of frag_size field in XDP RxQ info is
bpf_xdp_frags_increase_tail(). It clearly expects whole buff size instead
of DMA write size. Different assumptions in ice driver configuration lead
to negative tailroom.
This allows to trigger kernel panic, when using
XDP_ADJUST_TAIL_GROW_MULTI_BUFF xskxceiver test and changing packet size to
6912 and the re…
Affected Packages5 packages
▶CVEListV5linux/linux2fba7dc5157b6f85dbf1b8e26e63a724db1f3d79 — b0f05100e8795aadd1c0606bae9caefbda070d63+2
🔴Vulnerability Details
3OSV▶
CVE-2026-23377: In the Linux kernel, the following vulnerability has been resolved: ice: change XDP RxQ frag_size from DMA write length to xdp↗2026-03-25
GHSA▶
GHSA-r46f-q3f8-wrrg: In the Linux kernel, the following vulnerability has been resolved:
ice: change XDP RxQ frag_size from DMA write length to xdp↗2026-03-25
📋Vendor Advisories
3Debian▶
CVE-2026-23377: linux - In the Linux kernel, the following vulnerability has been resolved: ice: change...↗2026