net: sched: act_csum: validate nested VLAN headers
Summary
| CVE | CVE-2026-31684 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-25 09:16:02 UTC |
| Updated | 2026-04-25 09:16:02 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
net: sched: act_csum: validate nested VLAN headers
tcf_csum_act() walks nested VLAN headers directly from skb->data when an
skb still carries in-payload VLAN tags. The current code reads
vlan->h_vlan_encapsulated_proto and then pulls VLAN_HLEN bytes without
first ensuring that the full VLAN header is present in the linear area.
If only part of an inner VLAN header is linearized, accessing
h_vlan_encapsulated_proto reads past the linear area, and the following
skb_pull(VLAN_HLEN) may violate skb invariants.
Fix this by requiring pskb_may_pull(skb, VLAN_HLEN) before accessing and
pulling each nested VLAN header. If the header still is not fully
available, drop the packet through the existing error path. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 2ecba2d1e45b24620a7c3df9531895cf68d5dec6 a69738efea0996d05a3c7d2178551b891744df1b git |
Not specified |
| CNA |
Linux |
Linux |
affected 2ecba2d1e45b24620a7c3df9531895cf68d5dec6 ec4930979b3f7bbeb7af5744599fc6603a4dba62 git |
Not specified |
| CNA |
Linux |
Linux |
affected 2ecba2d1e45b24620a7c3df9531895cf68d5dec6 3d165d975305cf76ff0b10a3c798fb31e5f5f9a5 git |
Not specified |
| CNA |
Linux |
Linux |
affected 2ecba2d1e45b24620a7c3df9531895cf68d5dec6 c842743d073bdd683606cb414eb0ca84465dd834 git |
Not specified |
| CNA |
Linux |
Linux |
affected 3764bfae5056e95617b6ee074129297e11710886 git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.1 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.1 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.83 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.24 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.14 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/3d165d975305cf76ff0b10a3c798fb31e5f5f9a5 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/ec4930979b3f7bbeb7af5744599fc6603a4dba62 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/c842743d073bdd683606cb414eb0ca84465dd834 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/a69738efea0996d05a3c7d2178551b891744df1b |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.