af_key: validate families in pfkey_send_migrate()
Summary
| CVE | CVE-2026-31515 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:50 UTC |
| Updated | 2026-04-28 16:20:43 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: af_key: validate families in pfkey_send_migrate() syzbot was able to trigger a crash in skb_put() [1] Issue is that pfkey_send_migrate() does not check old/new families, and that set_ipsecrequest() @family argument was truncated, thus possibly overfilling the skb. Validate families early, do not wait set_ipsecrequest(). [1] skbuff: skb_over_panic: text:ffffffff8a752120 len:392 put:16 head:ffff88802a4ad040 data:ffff88802a4ad040 tail:0x188 end:0x180 dev:<NULL> kernel BUG at net/core/skbuff.c:214 ! Call Trace: <TASK> skb_over_panic net/core/skbuff.c:219 [inline] skb_put+0x159/0x210 net/core/skbuff.c:2655 skb_put_zero include/linux/skbuff.h:2788 [inline] set_ipsecrequest net/key/af_key.c:3532 [inline] pfkey_send_migrate+0x1270/0x2e50 net/key/af_key.c:3636 km_migrate+0x155/0x260 net/xfrm/xfrm_state.c:2848 xfrm_migrate+0x2140/0x2450 net/xfrm/xfrm_policy.c:4705 xfrm_do_migrate+0x8ff/0xaa0 net/xfrm/xfrm_user.c:3150 |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS: 0.000240000 probability, percentile 0.067930000 (date 2026-04-26)
Problem Types: CWE-476
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 08de61beab8a21c8e0b3906a97defda5f1f66ece d0c5aa8dd38887714f1aad04236a3620b56a5e4e git | Not specified |
| CNA | Linux | Linux | affected 08de61beab8a21c8e0b3906a97defda5f1f66ece e06b596fc4eb01936a2e5dccad17c946d660bab8 git | Not specified |
| CNA | Linux | Linux | affected 08de61beab8a21c8e0b3906a97defda5f1f66ece 8ddf8de7e758f6888988467af9ffc8adf589fb16 git | Not specified |
| CNA | Linux | Linux | affected 08de61beab8a21c8e0b3906a97defda5f1f66ece d3225e6b9bd51ec177970a628fe4b11237ce87d5 git | Not specified |
| CNA | Linux | Linux | affected 08de61beab8a21c8e0b3906a97defda5f1f66ece 7b18692c59afb8e5c364c8e3ac01e51dd6b52028 git | Not specified |
| CNA | Linux | Linux | affected 08de61beab8a21c8e0b3906a97defda5f1f66ece 83f644ea92987c100b82d8481ae2230faeed3d34 git | Not specified |
| CNA | Linux | Linux | affected 08de61beab8a21c8e0b3906a97defda5f1f66ece ee836e820a40e2ca4da8af7310bff92d586772d4 git | Not specified |
| CNA | Linux | Linux | affected 08de61beab8a21c8e0b3906a97defda5f1f66ece eb2d16a7d599dc9d4df391b5e660df9949963786 git | Not specified |
| CNA | Linux | Linux | affected 2.6.21 | Not specified |
| CNA | Linux | Linux | unaffected 2.6.21 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.168 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.131 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.80 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.21 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.11 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/e06b596fc4eb01936a2e5dccad17c946d660bab8 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/d0c5aa8dd38887714f1aad04236a3620b56a5e4e | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/8ddf8de7e758f6888988467af9ffc8adf589fb16 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/d3225e6b9bd51ec177970a628fe4b11237ce87d5 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/eb2d16a7d599dc9d4df391b5e660df9949963786 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/ee836e820a40e2ca4da8af7310bff92d586772d4 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/7b18692c59afb8e5c364c8e3ac01e51dd6b52028 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/83f644ea92987c100b82d8481ae2230faeed3d34 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.