{"id":"CVE-2026-23154","summary":"net: fix segmentation of forwarding fraglist GRO","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix segmentation of forwarding fraglist GRO\n\nThis patch enhances GSO segment handling by properly checking\nthe SKB_GSO_DODGY flag for frag_list GSO packets, addressing\nlow throughput issues observed when a station accesses IPv4\nservers via hotspots with an IPv6-only upstream interface.\n\nSpecifically, it fixes a bug in GSO segmentation when forwarding\nGRO packets containing a frag_list. The function skb_segment_list\ncannot correctly process GRO skbs that have been converted by XLAT,\nsince XLAT only translates the header of the head skb. Consequently,\nskbs in the frag_list may remain untranslated, resulting in protocol\ninconsistencies and reduced throughput.\n\nTo address this, the patch explicitly sets the SKB_GSO_DODGY flag\nfor GSO packets in XLAT's IPv4/IPv6 protocol translation helpers\n(bpf_skb_proto_4_to_6 and bpf_skb_proto_6_to_4). This marks GSO\npackets as potentially modified after protocol translation. As a\nresult, GSO segmentation will avoid using skb_segment_list and\ninstead falls back to skb_segment for packets with the SKB_GSO_DODGY\nflag. This ensures that only safe and fully translated frag_list\npackets are processed by skb_segment_list, resolving protocol\ninconsistencies and improving throughput when forwarding GRO packets\nconverted by XLAT.","modified":"2026-04-28T18:29:37.129309176Z","published":"2026-02-14T16:01:21.758Z","related":["SUSE-SU-2026:0962-1","SUSE-SU-2026:1081-1","SUSE-SU-2026:20838-1","SUSE-SU-2026:20931-1","SUSE-SU-2026:21114-1","SUSE-SU-2026:21123-1","SUSE-SU-2026:21255-1","SUSE-SU-2026:21284-1","openSUSE-SU-2026:20416-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23154.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2cbef9ea5a0ac51863ede35c45f26931a85d3888"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3d48d59235c494d34e32052f768393111c0806ef"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3e62db1e3140449608975e29e0979cc5f3b1cc07"},{"type":"WEB","url":"https://git.kernel.org/stable/c/426ca15c7f6cb6562a081341ca88893a50c59fa2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9122d7280b2303e835cdfec156bd932ac1f586ed"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23154.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23154"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9fd1ff5d2ac7181844735806b0a703c942365291"},{"fixed":"9122d7280b2303e835cdfec156bd932ac1f586ed"},{"fixed":"2cbef9ea5a0ac51863ede35c45f26931a85d3888"},{"fixed":"3e62db1e3140449608975e29e0979cc5f3b1cc07"},{"fixed":"3d48d59235c494d34e32052f768393111c0806ef"},{"fixed":"426ca15c7f6cb6562a081341ca88893a50c59fa2"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23154.json"}}],"schema_version":"1.7.5"}