CVE-2026-31515
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
22/04/2026
Last modified:
28/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
af_key: validate families in pfkey_send_migrate()<br />
<br />
syzbot was able to trigger a crash in skb_put() [1]<br />
<br />
Issue is that pfkey_send_migrate() does not check old/new families,<br />
and that set_ipsecrequest() @family argument was truncated,<br />
thus possibly overfilling the skb.<br />
<br />
Validate families early, do not wait set_ipsecrequest().<br />
<br />
[1]<br />
<br />
skbuff: skb_over_panic: text:ffffffff8a752120 len:392 put:16 head:ffff88802a4ad040 data:ffff88802a4ad040 tail:0x188 end:0x180 dev:<br />
kernel BUG at net/core/skbuff.c:214 !<br />
Call Trace:<br />
<br />
skb_over_panic net/core/skbuff.c:219 [inline]<br />
skb_put+0x159/0x210 net/core/skbuff.c:2655<br />
skb_put_zero include/linux/skbuff.h:2788 [inline]<br />
set_ipsecrequest net/key/af_key.c:3532 [inline]<br />
pfkey_send_migrate+0x1270/0x2e50 net/key/af_key.c:3636<br />
km_migrate+0x155/0x260 net/xfrm/xfrm_state.c:2848<br />
xfrm_migrate+0x2140/0x2450 net/xfrm/xfrm_policy.c:4705<br />
xfrm_do_migrate+0x8ff/0xaa0 net/xfrm/xfrm_user.c:3150
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.21.1 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.131 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.80 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.21:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/7b18692c59afb8e5c364c8e3ac01e51dd6b52028
- https://git.kernel.org/stable/c/83f644ea92987c100b82d8481ae2230faeed3d34
- https://git.kernel.org/stable/c/8ddf8de7e758f6888988467af9ffc8adf589fb16
- https://git.kernel.org/stable/c/d0c5aa8dd38887714f1aad04236a3620b56a5e4e
- https://git.kernel.org/stable/c/d3225e6b9bd51ec177970a628fe4b11237ce87d5
- https://git.kernel.org/stable/c/e06b596fc4eb01936a2e5dccad17c946d660bab8
- https://git.kernel.org/stable/c/eb2d16a7d599dc9d4df391b5e660df9949963786
- https://git.kernel.org/stable/c/ee836e820a40e2ca4da8af7310bff92d586772d4



