VYPR
Medium severity5.5NVD Advisory· Published Mar 25, 2026· Updated Apr 24, 2026

CVE-2026-23386

CVE-2026-23386

Description

In the Linux kernel, the following vulnerability has been resolved:

gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL

In DQ-QPL mode, gve_tx_clean_pending_packets() incorrectly uses the RDA buffer cleanup path. It iterates num_bufs times and attempts to unmap entries in the dma array.

This leads to two issues: 1. The dma array shares storage with tx_qpl_buf_ids (union). Interpreting buffer IDs as DMA addresses results in attempting to unmap incorrect memory locations. 2. num_bufs in QPL mode (counting 2K chunks) can significantly exceed the size of the dma array, causing out-of-bounds access warnings (trace below is how we noticed this issue).

UBSAN: array-index-out-of-bounds in drivers/net/ethernet/drivers/net/ethernet/google/gve/gve_tx_dqo.c:178:5 index 18 is out of range for type 'dma_addr_t[18]' (aka 'unsigned long long[18]') Workqueue: gve gve_service_task [gve] Call Trace:

dump_stack_lvl+0x33/0xa0 __ubsan_handle_out_of_bounds+0xdc/0x110 gve_tx_stop_ring_dqo+0x182/0x200 [gve] gve_close+0x1be/0x450 [gve] gve_reset+0x99/0x120 [gve] gve_service_task+0x61/0x100 [gve] process_scheduled_works+0x1e9/0x380

Fix this by properly checking for QPL mode and delegating to gve_free_tx_qpl_bufs() to reclaim the buffers.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's GVE driver, DQ-QPL mode buffer cleanup uses the wrong path, causing out-of-bounds memory access.

CVE-2026-23386 is a medium-severity vulnerability in the Linux kernel's Google Virtual Ethernet (gve) driver, affecting the buffer cleanup logic in gve_tx_clean_pending_packets(). In DQ-QPL mode, the function incorrectly follows the RDA (regular descriptor array) cleanup path, iterating over num_bufs and attempting to unmap entries from the DMA array. However, in QPL mode the DMA array shares storage with tx_qpl_buf_ids via a union, so interpreting buffer IDs as DMA addresses leads to unmapping incorrect memory locations [1]. Additionally, num_bufs in QPL mode (counting 2K chunks) can exceed the DMA array size, triggering out-of-bounds access warnings as observed in UBSAN traces [2].

The vulnerability can be triggered during normal network operation, specifically when the gve driver resets or closes the network interface. The cleanup function is called from gve_tx_stop_ring_dqo() during device teardown, which is invoked by gve_close() and gve_reset() [3]. An attacker with local access or the ability to influence network interface state could potentially exploit the out-of-bounds access to cause a kernel crash (denial of service) or may lead to memory corruption. The CVSS v3 score of 5.5 reflects the need for local access and high availability impact.

The impact includes kernel panic or memory corruption due to the out-of-bounds array access and incorrect DMA unmapping. The fix, which properly checks for QPL mode and delegates to gve_free_tx_qpl_bufs() instead, has been applied to stable kernel branches [4]. Users should update to the latest kernel to mitigate this issue.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

10
  • Linux/Kernel10 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 9 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.6.1,<6.6.130
    • cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.