CVE-2026-31429
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/04/2026
Last modified:
27/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: skb: fix cross-cache free of KFENCE-allocated skb head<br />
<br />
SKB_SMALL_HEAD_CACHE_SIZE is intentionally set to a non-power-of-2<br />
value (e.g. 704 on x86_64) to avoid collisions with generic kmalloc<br />
bucket sizes. This ensures that skb_kfree_head() can reliably use<br />
skb_end_offset to distinguish skb heads allocated from<br />
skb_small_head_cache vs. generic kmalloc caches.<br />
<br />
However, when KFENCE is enabled, kfence_ksize() returns the exact<br />
requested allocation size instead of the slab bucket size. If a caller<br />
(e.g. bpf_test_init) allocates skb head data via kzalloc() and the<br />
requested size happens to equal SKB_SMALL_HEAD_CACHE_SIZE, then<br />
slab_build_skb() -> ksize() returns that exact value. After subtracting<br />
skb_shared_info overhead, skb_end_offset ends up matching<br />
SKB_SMALL_HEAD_HEADROOM, causing skb_kfree_head() to incorrectly free<br />
the object to skb_small_head_cache instead of back to the original<br />
kmalloc cache, resulting in a slab cross-cache free:<br />
<br />
kmem_cache_free(skbuff_small_head): Wrong slab cache. Expected<br />
skbuff_small_head but got kmalloc-1k<br />
<br />
Fix this by always calling kfree(head) in skb_kfree_head(). This keeps<br />
the free path generic and avoids allocator-specific misclassification<br />
for KFENCE objects.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0f42e3f4fe2a58394e37241d02d9ca6ab7b7d516
- https://git.kernel.org/stable/c/128b03ccb2582a643983a48a37fda58df80edbde
- https://git.kernel.org/stable/c/2d64618ea846d8d033477311f805ca487d6a6696
- https://git.kernel.org/stable/c/474e00b935db250cac320d10c1d3cf4e44b46721
- https://git.kernel.org/stable/c/60313768a8edc7094435975587c00c2d7b834083



