Home

Description

In the Linux kernel, the following vulnerability has been resolved: fou: Don't allow 0 for FOU_ATTR_IPPROTO. fou_udp_recv() has the same problem mentioned in the previous patch. If FOU_ATTR_IPPROTO is set to 0, skb is not freed by fou_udp_recv() nor "resubmit"-ted in ip_protocol_deliver_rcu(). Let's forbid 0 for FOU_ATTR_IPPROTO.

PUBLISHED Reserved 2026-01-13 | Published 2026-02-04 | Updated 2026-02-09 | Assigner Linux

Product status

Default status
unaffected

23461551c00628c3f3fe9cf837bf53cf8f212b63 (git) before c7498f9bc390479ccfad7c7f2332237ff4945b03
affected

23461551c00628c3f3fe9cf837bf53cf8f212b63 (git) before 611ef4bd9c73d9e6d87bed57a635ff1fdd8c91ea
affected

23461551c00628c3f3fe9cf837bf53cf8f212b63 (git) before 6e983789b7588ee59cbf303583546c043bad8e19
affected

23461551c00628c3f3fe9cf837bf53cf8f212b63 (git) before 1cc98b8887cabb1808d2f4a37cd10a7be7574771
affected

23461551c00628c3f3fe9cf837bf53cf8f212b63 (git) before b7db31a52c3862a1a32202a273a4c32e7f5f4823
affected

23461551c00628c3f3fe9cf837bf53cf8f212b63 (git) before 9b75dff8446ec871030d8daf5a69e74f5fe8b956
affected

23461551c00628c3f3fe9cf837bf53cf8f212b63 (git) before 7a9bc9e3f42391e4c187e099263cf7a1c4b69ff5
affected

Default status
affected

3.18
affected

Any version before 3.18
unaffected

5.10.249 (semver)
unaffected

5.15.199 (semver)
unaffected

6.1.162 (semver)
unaffected

6.6.122 (semver)
unaffected

6.12.68 (semver)
unaffected

6.18.8 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/c7498f9bc390479ccfad7c7f2332237ff4945b03

git.kernel.org/...c/611ef4bd9c73d9e6d87bed57a635ff1fdd8c91ea

git.kernel.org/...c/6e983789b7588ee59cbf303583546c043bad8e19

git.kernel.org/...c/1cc98b8887cabb1808d2f4a37cd10a7be7574771

git.kernel.org/...c/b7db31a52c3862a1a32202a273a4c32e7f5f4823

git.kernel.org/...c/9b75dff8446ec871030d8daf5a69e74f5fe8b956

git.kernel.org/...c/7a9bc9e3f42391e4c187e099263cf7a1c4b69ff5

cve.org (CVE-2026-23083)

nvd.nist.gov (CVE-2026-23083)

Download JSON