esp: fix skb leak with espintcp and async crypto
Summary
| CVE | CVE-2026-31518 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:51 UTC |
| Updated | 2026-04-22 14:16:51 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
esp: fix skb leak with espintcp and async crypto
When the TX queue for espintcp is full, esp_output_tail_tcp will
return an error and not free the skb, because with synchronous crypto,
the common xfrm output code will drop the packet for us.
With async crypto (esp_output_done), we need to drop the skb when
esp_output_tail_tcp returns an error. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 aca3ad0c262f54a5b5c95dda80a48365997d1224 git |
Not specified |
| CNA |
Linux |
Linux |
affected e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 41aafca57de4a4c026701622bd4648f112a9edcd git |
Not specified |
| CNA |
Linux |
Linux |
affected e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 4820847e036ff1035b01b69ad68dfc17e7028fe9 git |
Not specified |
| CNA |
Linux |
Linux |
affected e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 6a3ec6efbc4f90e0ccb2e71574f07351f19996f4 git |
Not specified |
| CNA |
Linux |
Linux |
affected e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 df6f995358dc1f3c42484f5cfe241d7bd3e1cd15 git |
Not specified |
| CNA |
Linux |
Linux |
affected e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 88d386243ed374ac969dabd3bbc1409a31d81818 git |
Not specified |
| CNA |
Linux |
Linux |
affected e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 6aa9841d917532d0f2d932d1ff2f3a94305aaf47 git |
Not specified |
| CNA |
Linux |
Linux |
affected e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 0c0eef8ccd2413b0a10eb6bbd3442333b1e64dd2 git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.6 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.6 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10.253 5.10.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.203 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.168 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.131 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.80 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.21 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.11 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/4820847e036ff1035b01b69ad68dfc17e7028fe9 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/aca3ad0c262f54a5b5c95dda80a48365997d1224 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/0c0eef8ccd2413b0a10eb6bbd3442333b1e64dd2 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/6a3ec6efbc4f90e0ccb2e71574f07351f19996f4 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/88d386243ed374ac969dabd3bbc1409a31d81818 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/df6f995358dc1f3c42484f5cfe241d7bd3e1cd15 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/6aa9841d917532d0f2d932d1ff2f3a94305aaf47 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/41aafca57de4a4c026701622bd4648f112a9edcd |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.