Home

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: hold dev ref until after transport_finish NF_HOOK After async crypto completes, xfrm_input_resume() calls dev_put() immediately on re-entry before the skb reaches transport_finish. The skb->dev pointer is then used inside NF_HOOK and its okfn, which can race with device teardown. Remove the dev_put from the async resumption entry and instead drop the reference after the NF_HOOK call in transport_finish, using a saved device pointer since NF_HOOK may consume the skb. This covers NF_DROP, NF_QUEUE and NF_STOLEN paths that skip the okfn. For non-transport exits (decaps, gro, drop) and secondary async return points, release the reference inline when async is set.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-27 | Assigner Linux




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

acf568ee859f098279eadf551612f103afdacb4e (git) before 0f451b43c88bf2b9c038b414be580efee42e031b
affected

acf568ee859f098279eadf551612f103afdacb4e (git) before 5002beda5cac69d522dc54da0d5d463ed9c963d2
affected

acf568ee859f098279eadf551612f103afdacb4e (git) before 1c428b03840094410c5fb6a5db30640486bbbfcb
affected

69895c5ea0ca2e8d7de1e6d36965d0ab9730787f (git)
affected

833760100588acfb267dac4d6a02ab9931237739 (git)
affected

e095ecaec6d94aa2156cceb98a85d409b51190f3 (git)
affected

Default status
affected

4.15
affected

Any version before 4.15
unaffected

6.18.23 (semver)
unaffected

6.19.13 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/0f451b43c88bf2b9c038b414be580efee42e031b

git.kernel.org/...c/5002beda5cac69d522dc54da0d5d463ed9c963d2

git.kernel.org/...c/1c428b03840094410c5fb6a5db30640486bbbfcb

cve.org (CVE-2026-31663)

nvd.nist.gov (CVE-2026-31663)

Download JSON