CVE-2026-31515

In the Linux kernel, the following vulnerability has been resolved: af_key: validate families in pfkey_send_migrate() syzbot was able to trigger a crash in skb_put() [1] Issue is that pfkey_send_migrate() does not check old/new families, and that set_ipsecrequest() @family argument was truncated, thus possibly overfilling the skb. Validate families early, do not wait set_ipsecrequest(). [1] skbuff: skb_over_panic: text:ffffffff8a752120 len:392 put:16 head:ffff88802a4ad040 data:ffff88802a4ad040 tail:0x188 end:0x180 dev:<NULL> kernel BUG at net/core/skbuff.c:214 ! Call Trace: <TASK> skb_over_panic net/core/skbuff.c:219 [inline] skb_put+0x159/0x210 net/core/skbuff.c:2655 skb_put_zero include/linux/skbuff.h:2788 [inline] set_ipsecrequest net/key/af_key.c:3532 [inline] pfkey_send_migrate+0x1270/0x2e50 net/key/af_key.c:3636 km_migrate+0x155/0x260 net/xfrm/xfrm_state.c:2848 xfrm_migrate+0x2140/0x2450 net/xfrm/xfrm_policy.c:4705 xfrm_do_migrate+0x8ff/0xaa0 net/xfrm/xfrm_user.c:3150
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

History

28 Apr 2026, 16:20

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/7b18692c59afb8e5c364c8e3ac01e51dd6b52028 - () https://git.kernel.org/stable/c/7b18692c59afb8e5c364c8e3ac01e51dd6b52028 - Patch
References () https://git.kernel.org/stable/c/83f644ea92987c100b82d8481ae2230faeed3d34 - () https://git.kernel.org/stable/c/83f644ea92987c100b82d8481ae2230faeed3d34 - Patch
References () https://git.kernel.org/stable/c/8ddf8de7e758f6888988467af9ffc8adf589fb16 - () https://git.kernel.org/stable/c/8ddf8de7e758f6888988467af9ffc8adf589fb16 - Patch
References () https://git.kernel.org/stable/c/d0c5aa8dd38887714f1aad04236a3620b56a5e4e - () https://git.kernel.org/stable/c/d0c5aa8dd38887714f1aad04236a3620b56a5e4e - Patch
References () https://git.kernel.org/stable/c/d3225e6b9bd51ec177970a628fe4b11237ce87d5 - () https://git.kernel.org/stable/c/d3225e6b9bd51ec177970a628fe4b11237ce87d5 - Patch
References () https://git.kernel.org/stable/c/e06b596fc4eb01936a2e5dccad17c946d660bab8 - () https://git.kernel.org/stable/c/e06b596fc4eb01936a2e5dccad17c946d660bab8 - Patch
References () https://git.kernel.org/stable/c/eb2d16a7d599dc9d4df391b5e660df9949963786 - () https://git.kernel.org/stable/c/eb2d16a7d599dc9d4df391b5e660df9949963786 - Patch
References () https://git.kernel.org/stable/c/ee836e820a40e2ca4da8af7310bff92d586772d4 - () https://git.kernel.org/stable/c/ee836e820a40e2ca4da8af7310bff92d586772d4 - Patch
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*

22 Apr 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-22 14:16

Updated : 2026-04-28 16:20


NVD link : CVE-2026-31515

Mitre link : CVE-2026-31515

CVE.ORG link : CVE-2026-31515


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference