In the Linux kernel, the following vulnerability has been resolved:
esp: fix skb leak with espintcp and async crypto
When the TX queue for espintcp is full, esp_output_tail_tcp will
return an error and not free the skb, because with synchronous crypto,
the common xfrm output code will drop the packet for us.
With async crypto (esp_output_done), we need to drop the skb when
esp_output_tail_tcp returns an error.
References
Configurations
Configuration 1 (hide)
|
History
28 Apr 2026, 17:25
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* |
|
| CWE | CWE-401 | |
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/0c0eef8ccd2413b0a10eb6bbd3442333b1e64dd2 - Patch | |
| References | () https://git.kernel.org/stable/c/41aafca57de4a4c026701622bd4648f112a9edcd - Patch | |
| References | () https://git.kernel.org/stable/c/4820847e036ff1035b01b69ad68dfc17e7028fe9 - Patch | |
| References | () https://git.kernel.org/stable/c/6a3ec6efbc4f90e0ccb2e71574f07351f19996f4 - Patch | |
| References | () https://git.kernel.org/stable/c/6aa9841d917532d0f2d932d1ff2f3a94305aaf47 - Patch | |
| References | () https://git.kernel.org/stable/c/88d386243ed374ac969dabd3bbc1409a31d81818 - Patch | |
| References | () https://git.kernel.org/stable/c/aca3ad0c262f54a5b5c95dda80a48365997d1224 - Patch | |
| References | () https://git.kernel.org/stable/c/df6f995358dc1f3c42484f5cfe241d7bd3e1cd15 - Patch |
22 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-22 14:16
Updated : 2026-04-28 17:25
NVD link : CVE-2026-31518
Mitre link : CVE-2026-31518
CVE.ORG link : CVE-2026-31518
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
