batman-adv: avoid OGM aggregation when skb tailroom is insufficient
Summary
| CVE | CVE-2026-31683 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-25 09:16:02 UTC |
| Updated | 2026-04-25 09:16:02 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
batman-adv: avoid OGM aggregation when skb tailroom is insufficient
When OGM aggregation state is toggled at runtime, an existing forwarded
packet may have been allocated with only packet_len bytes, while a later
packet can still be selected for aggregation. Appending in this case can
hit skb_put overflow conditions.
Reject aggregation when the target skb tailroom cannot accommodate the new
packet. The caller then falls back to creating a new forward packet
instead of appending. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected c6c8fea29769d998d94fcec9b9f14d4b52b349d3 67176c96f325837b0bb3e9538ca2eba414f447d8 git |
Not specified |
| CNA |
Linux |
Linux |
affected c6c8fea29769d998d94fcec9b9f14d4b52b349d3 0b10a8b355c3f71012ce89289ec2c2f5e3bfd6c1 git |
Not specified |
| CNA |
Linux |
Linux |
affected c6c8fea29769d998d94fcec9b9f14d4b52b349d3 6755347c5f9bdd44dee80f692208b056fcd40a52 git |
Not specified |
| CNA |
Linux |
Linux |
affected c6c8fea29769d998d94fcec9b9f14d4b52b349d3 1ada20331f2df2a942d6b83ae1f04a304b642e2a git |
Not specified |
| CNA |
Linux |
Linux |
affected c6c8fea29769d998d94fcec9b9f14d4b52b349d3 6e40ebb999c2c3d2fbb3cacb61f0384ee6e69075 git |
Not specified |
| CNA |
Linux |
Linux |
affected c6c8fea29769d998d94fcec9b9f14d4b52b349d3 0e35db29fc5a97a8553f7c2d3a2ba730e46b1ee8 git |
Not specified |
| CNA |
Linux |
Linux |
affected c6c8fea29769d998d94fcec9b9f14d4b52b349d3 eda89a1bae0602aec8314ced299bb243b9f9aeef git |
Not specified |
| CNA |
Linux |
Linux |
affected c6c8fea29769d998d94fcec9b9f14d4b52b349d3 0d4aef630be9d5f9c1227d07669c26c4383b5ad0 git |
Not specified |
| CNA |
Linux |
Linux |
affected 2.6.38 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 2.6.38 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10.253 5.10.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.203 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.167 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.130 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.78 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.20 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.10 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/6e40ebb999c2c3d2fbb3cacb61f0384ee6e69075 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/1ada20331f2df2a942d6b83ae1f04a304b642e2a |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/0b10a8b355c3f71012ce89289ec2c2f5e3bfd6c1 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/0e35db29fc5a97a8553f7c2d3a2ba730e46b1ee8 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/0d4aef630be9d5f9c1227d07669c26c4383b5ad0 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/eda89a1bae0602aec8314ced299bb243b9f9aeef |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/67176c96f325837b0bb3e9538ca2eba414f447d8 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/6755347c5f9bdd44dee80f692208b056fcd40a52 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.