{"api_version":"1","generated_at":"2026-04-25T13:02:03+00:00","cve":"CVE-2026-31677","urls":{"html":"https://cve.report/CVE-2026-31677","api":"https://cve.report/api/cve/CVE-2026-31677.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-31677","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-31677"},"summary":{"title":"crypto: af_alg - limit RX SG extraction by receive buffer budget","description":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - limit RX SG extraction by receive buffer budget\n\nMake af_alg_get_rsgl() limit each RX scatterlist extraction to the\nremaining receive buffer budget.\n\naf_alg_get_rsgl() currently uses af_alg_readable() only as a gate\nbefore extracting data into the RX scatterlist. Limit each extraction\nto the remaining af_alg_rcvbuf(sk) budget so that receive-side\naccounting matches the amount of data attached to the request.\n\nIf skcipher cannot obtain enough RX space for at least one chunk while\nmore data remains to be processed, reject the recvmsg call instead of\nrounding the request length down to zero.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-04-25 09:16:01","updated_at":"2026-04-25 09:16:01"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/9bf3e6ccfdcfe56ae3190d1ae987dacf1cfef4f9","name":"https://git.kernel.org/stable/c/9bf3e6ccfdcfe56ae3190d1ae987dacf1cfef4f9","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/07c6f6ffe29009426f0bd4d3cfbb6308b8ea8453","name":"https://git.kernel.org/stable/c/07c6f6ffe29009426f0bd4d3cfbb6308b8ea8453","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/8eceab19eba9dcbfd2a0daec72e1bf48aa100170","name":"https://git.kernel.org/stable/c/8eceab19eba9dcbfd2a0daec72e1bf48aa100170","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/4a264b2614c73c96666e196bbabe0cead52bdba7","name":"https://git.kernel.org/stable/c/4a264b2614c73c96666e196bbabe0cead52bdba7","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-31677","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31677","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected e870456d8e7c8d57c059ea479b5aadbb55ff4c3a 9bf3e6ccfdcfe56ae3190d1ae987dacf1cfef4f9 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected e870456d8e7c8d57c059ea479b5aadbb55ff4c3a 07c6f6ffe29009426f0bd4d3cfbb6308b8ea8453 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected e870456d8e7c8d57c059ea479b5aadbb55ff4c3a 4a264b2614c73c96666e196bbabe0cead52bdba7 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected e870456d8e7c8d57c059ea479b5aadbb55ff4c3a 8eceab19eba9dcbfd2a0daec72e1bf48aa100170 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 4.14","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 4.14 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.83 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.24 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.14 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["crypto/af_alg.c","crypto/algif_skcipher.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"9bf3e6ccfdcfe56ae3190d1ae987dacf1cfef4f9","status":"affected","version":"e870456d8e7c8d57c059ea479b5aadbb55ff4c3a","versionType":"git"},{"lessThan":"07c6f6ffe29009426f0bd4d3cfbb6308b8ea8453","status":"affected","version":"e870456d8e7c8d57c059ea479b5aadbb55ff4c3a","versionType":"git"},{"lessThan":"4a264b2614c73c96666e196bbabe0cead52bdba7","status":"affected","version":"e870456d8e7c8d57c059ea479b5aadbb55ff4c3a","versionType":"git"},{"lessThan":"8eceab19eba9dcbfd2a0daec72e1bf48aa100170","status":"affected","version":"e870456d8e7c8d57c059ea479b5aadbb55ff4c3a","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["crypto/af_alg.c","crypto/algif_skcipher.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"4.14"},{"lessThan":"4.14","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.83","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.24","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.14","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.83","versionStartIncluding":"4.14","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.24","versionStartIncluding":"4.14","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.14","versionStartIncluding":"4.14","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"4.14","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - limit RX SG extraction by receive buffer budget\n\nMake af_alg_get_rsgl() limit each RX scatterlist extraction to the\nremaining receive buffer budget.\n\naf_alg_get_rsgl() currently uses af_alg_readable() only as a gate\nbefore extracting data into the RX scatterlist. Limit each extraction\nto the remaining af_alg_rcvbuf(sk) budget so that receive-side\naccounting matches the amount of data attached to the request.\n\nIf skcipher cannot obtain enough RX space for at least one chunk while\nmore data remains to be processed, reject the recvmsg call instead of\nrounding the request length down to zero."}],"providerMetadata":{"dateUpdated":"2026-04-25T08:46:53.379Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/9bf3e6ccfdcfe56ae3190d1ae987dacf1cfef4f9"},{"url":"https://git.kernel.org/stable/c/07c6f6ffe29009426f0bd4d3cfbb6308b8ea8453"},{"url":"https://git.kernel.org/stable/c/4a264b2614c73c96666e196bbabe0cead52bdba7"},{"url":"https://git.kernel.org/stable/c/8eceab19eba9dcbfd2a0daec72e1bf48aa100170"}],"title":"crypto: af_alg - limit RX SG extraction by receive buffer budget","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-31677","datePublished":"2026-04-25T08:46:53.379Z","dateReserved":"2026-03-09T15:48:24.130Z","dateUpdated":"2026-04-25T08:46:53.379Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-25 09:16:01","lastModifiedDate":"2026-04-25 09:16:01","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"31677","Ordinal":"1","Title":"crypto: af_alg - limit RX SG extraction by receive buffer budget","CVE":"CVE-2026-31677","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"31677","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - limit RX SG extraction by receive buffer budget\n\nMake af_alg_get_rsgl() limit each RX scatterlist extraction to the\nremaining receive buffer budget.\n\naf_alg_get_rsgl() currently uses af_alg_readable() only as a gate\nbefore extracting data into the RX scatterlist. Limit each extraction\nto the remaining af_alg_rcvbuf(sk) budget so that receive-side\naccounting matches the amount of data attached to the request.\n\nIf skcipher cannot obtain enough RX space for at least one chunk while\nmore data remains to be processed, reject the recvmsg call instead of\nrounding the request length down to zero.","Type":"Description","Title":"crypto: af_alg - limit RX SG extraction by receive buffer budget"}]}}}