-
CVE-2026-31429
- EPSS 0.02%
- Veröffentlicht 20.04.2026 09:43:03
- Zuletzt bearbeitet 27.04.2026 14:16:37
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
net: skb: fix cross-cache free of KFENCE-allocated skb head
In the Linux kernel, the following vulnerability has been resolved: net: skb: fix cross-cache free of KFENCE-allocated skb head SKB_SMALL_HEAD_CACHE_SIZE is intentionally set to a non-power-of-2 value (e.g. 704 on x86_64) to avoid collisions with generic kmalloc bucket sizes. This ensures that skb_kfree_head() can reliably use skb_end_offset to distinguish skb heads allocated from skb_small_head_cache vs. generic kmalloc caches. However, when KFENCE is enabled, kfence_ksize() returns the exact requested allocation size instead of the slab bucket size. If a caller (e.g. bpf_test_init) allocates skb head data via kzalloc() and the requested size happens to equal SKB_SMALL_HEAD_CACHE_SIZE, then slab_build_skb() -> ksize() returns that exact value. After subtracting skb_shared_info overhead, skb_end_offset ends up matching SKB_SMALL_HEAD_HEADROOM, causing skb_kfree_head() to incorrectly free the object to skb_small_head_cache instead of back to the original kmalloc cache, resulting in a slab cross-cache free: kmem_cache_free(skbuff_small_head): Wrong slab cache. Expected skbuff_small_head but got kmalloc-1k Fix this by always calling kfree(head) in skb_kfree_head(). This keeps the free path generic and avoids allocator-specific misclassification for KFENCE objects.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
bf9f1baa279f0758dc2297080360c5a616843927
Version <
128b03ccb2582a643983a48a37fda58df80edbde
Status
affected
Version
bf9f1baa279f0758dc2297080360c5a616843927
Version <
60313768a8edc7094435975587c00c2d7b834083
Status
affected
Version
bf9f1baa279f0758dc2297080360c5a616843927
Version <
2d64618ea846d8d033477311f805ca487d6a6696
Status
affected
Version
bf9f1baa279f0758dc2297080360c5a616843927
Version <
474e00b935db250cac320d10c1d3cf4e44b46721
Status
affected
Version
bf9f1baa279f0758dc2297080360c5a616843927
Version <
0f42e3f4fe2a58394e37241d02d9ca6ab7b7d516
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.3
Status
affected
Version
0
Version <
6.3
Status
unaffected
Version <=
6.6.*
Version
6.6.136
Status
unaffected
Version <=
6.12.*
Version
6.12.82
Status
unaffected
Version <=
6.18.*
Version
6.18.23
Status
unaffected
Version <=
6.19.*
Version
6.19.13
Status
unaffected
Version <=
*
Version
7.0
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.066 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|