CVE-2026-23154

N/A Unknown

📋 TL;DR

This vulnerability in the Linux kernel causes protocol inconsistencies and reduced network throughput when forwarding GRO packets through IPv4/IPv6 translation (XLAT). It affects systems using IPv4/IPv6 protocol translation with Generic Receive Offload (GRO) enabled, particularly in hotspot or gateway scenarios.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE; check kernel commits for exact ranges
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires GRO enabled and IPv4/IPv6 protocol translation (XLAT) via bpf_skb_proto_4_to_6 or bpf_skb_proto_6_to_4 helpers.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Network performance degradation leading to service disruption, packet loss, and potential denial of service in high-traffic environments.

🟠

Likely Case

Reduced network throughput and inefficient packet processing in IPv4/IPv6 translation scenarios, impacting network performance.

🟢

If Mitigated

Minimal impact with proper kernel patching or workarounds; normal network operations maintained.

🌐 Internet-Facing: MEDIUM - Affects gateway and hotspot systems that perform protocol translation, potentially impacting internet-facing services.
🏢 Internal Only: LOW - Primarily affects network infrastructure components rather than end-user systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

This is a performance/functionality bug rather than a traditional security vulnerability. Exploitation would require specific network configuration and traffic patterns.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 3d48d59235c494d34e32052f768393111c0806ef, 3e62db1e3140449608975e29e0979cc5f3b1cc07, or 426ca15c7f6cb6562a081341ca88893a50c59fa2

Vendor Advisory: https://git.kernel.org/stable/c/3d48d59235c494d34e32052f768393111c0806ef

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable GRO on affected interfaces

linux

Disable Generic Receive Offload to prevent the vulnerable code path

ethtool -K <interface> gro off

Avoid IPv4/IPv6 protocol translation

all

Configure network to avoid using bpf_skb_proto_4_to_6 or bpf_skb_proto_6_to_4 helpers

🧯 If You Can't Patch

  • Implement workarounds to disable GRO on affected interfaces
  • Monitor network performance and throughput metrics for degradation

🔍 How to Verify

Check if Vulnerable:

Check if system uses IPv4/IPv6 translation with GRO enabled and experiences throughput issues in specific network scenarios

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits and test network throughput in IPv4/IPv6 translation scenarios

📡 Detection & Monitoring

Log Indicators:

  • Network performance degradation logs
  • Packet processing errors in kernel logs

Network Indicators:

  • Reduced throughput in IPv4/IPv6 translation scenarios
  • Increased packet retransmissions

SIEM Query:

Search for network performance alerts or kernel errors related to GSO segmentation

🔗 References

📤 Share & Export