Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2402 articles · 111882 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-31429PATCHED
Linux · Linux

net: skb: fix cross-cache free of KFENCE-allocated skb head

Description

In the Linux kernel, the following vulnerability has been resolved: net: skb: fix cross-cache free of KFENCE-allocated skb head SKB_SMALL_HEAD_CACHE_SIZE is intentionally set to a non-power-of-2 value (e.g. 704 on x86_64) to avoid collisions with generic kmalloc bucket sizes. This ensures that skb_kfree_head() can reliably use skb_end_offset to distinguish skb heads allocated from skb_small_head_cache vs. generic kmalloc caches. However, when KFENCE is enabled, kfence_ksize() returns the exact requested allocation size instead of the slab bucket size. If a caller (e.g. bpf_test_init) allocates skb head data via kzalloc() and the requested size happens to equal SKB_SMALL_HEAD_CACHE_SIZE, then slab_build_skb() -> ksize() returns that exact value. After subtracting skb_shared_info overhead, skb_end_offset ends up matching SKB_SMALL_HEAD_HEADROOM, causing skb_kfree_head() to incorrectly free the object to skb_small_head_cache instead of back to the original kmalloc cache, resulting in a slab cross-cache free: kmem_cache_free(skbuff_small_head): Wrong slab cache. Expected skbuff_small_head but got kmalloc-1k Fix this by always calling kfree(head) in skb_kfree_head(). This keeps the free path generic and avoids allocator-specific misclassification for KFENCE objects.

Affected Products

VendorProductVersions
LinuxLinuxbf9f1baa279f0758dc2297080360c5a616843927, bf9f1baa279f0758dc2297080360c5a616843927, bf9f1baa279f0758dc2297080360c5a616843927, bf9f1baa279f0758dc2297080360c5a616843927, 6.3, 6.12.81, 6.18.22, 6.19.12

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
linuxlinuxmitre_affected90%
open sourceopen source linux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/60313768a8edc7094435975587c00c2d7b834083
  • https://git.kernel.org/stable/c/2d64618ea846d8d033477311f805ca487d6a6696
  • https://git.kernel.org/stable/c/474e00b935db250cac320d10c1d3cf4e44b46721
  • https://git.kernel.org/stable/c/0f42e3f4fe2a58394e37241d02d9ca6ab7b7d516

Related News (3 articles)

Tier B
BSI Advisories5h ago
[NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier C
VulDB5h ago
CVE-2026-31429 | Linux Kernel up to 6.12.81/6.18.22/6.19.12 net skb_kfree_head allocation of resources
→ No new info (linked only)
Tier C
Linux Kernel CVEs6h ago
CVE-2026-31429: net: skb: fix cross-cache free of KFENCE-allocated skb head
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
Patch available
60313768a8edc7094435975587c00c2d7b8340832d64618ea846d8d033477311f805ca487d6a6696474e00b935db250cac320d10c1d3cf4e44b467210f42e3f4fe2a58394e37241d02d9ca6ab7b7d51606.12.826.18.236.19.137.0
PublishedApr 20, 2026
Last enriched5h agov2
Trending Score35
Source articles3
Independent3
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-31430EXP
X.509: Fix out-of-bounds access when parsing extensions
Trending: 64
HIGHCVE-2026-23400EXP
rust_binder: call set_notification_done() without proc lock
Trending: 62
NONECVE-2026-23398EXP
icmp: fix NULL pointer dereference in icmp_tag_validation()
Trending: 28
NONECVE-2026-31416EXP
netfilter: nfnetlink_log: account for netlink header size
Trending: 26
NONECVE-2026-31427EXP
netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp
Trending: 23

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 20, 2026
Discovered by ZDM
Apr 20, 2026
Patch Available
Apr 20, 2026
Updated: affectedVersions
Apr 20, 2026

Version History

v2
Last enriched 5h ago
v2Tier C5h ago

Updated severity to CRITICAL, added affected versions 6.12.81, 6.18.22, 6.19.12, and corrected exploit availability to false.

affectedVersions
via VulDB
v16h ago

Initial creation