Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2251 articles · 104388 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-31406PATCHED
Linux · Linux

xfrm: Fix work re-schedule after cancel in xfrm_nat_keepalive_net_fini()

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: Fix work re-schedule after cancel in xfrm_nat_keepalive_net_fini() After cancel_delayed_work_sync() is called from xfrm_nat_keepalive_net_fini(), xfrm_state_fini() flushes remaining states via __xfrm_state_delete(), which calls xfrm_nat_keepalive_state_updated() to re-schedule nat_keepalive_work. The following is a simple race scenario: cpu0 cpu1 cleanup_net() [Round 1] ops_undo_list() xfrm_net_exit() xfrm_nat_keepalive_net_fini() cancel_delayed_work_sync(nat_keepalive_work); xfrm_state_fini() xfrm_state_flush() xfrm_state_delete(x) __xfrm_state_delete(x) xfrm_nat_keepalive_state_updated(x) schedule_delayed_work(nat_keepalive_work); rcu_barrier(); net_complete_free(); net_passive_dec(net); llist_add(&net->defer_free_list, &defer_free_list); cleanup_net() [Round 2] rcu_barrier(); net_complete_free() kmem_cache_free(net_cachep, net); nat_keepalive_work() // on freed net To prevent this, cancel_delayed_work_sync() is replaced with disable_delayed_work_sync().

Affected Products

VendorProductVersions
LinuxLinuxf531d13bdfe3f4f084aaa8acae2cb0f02295f5ae, f531d13bdfe3f4f084aaa8acae2cb0f02295f5ae, f531d13bdfe3f4f084aaa8acae2cb0f02295f5ae, f531d13bdfe3f4f084aaa8acae2cb0f02295f5ae, 6.11

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
linuxlinuxmitre_affected90%

References

  • https://git.kernel.org/stable/c/32d0f44c2f14d60fe8e920e69a28c11051543ec1
  • https://git.kernel.org/stable/c/2255ed6adbc3100d2c4a83abd9d0396d04b87792
  • https://git.kernel.org/stable/c/21f2fc49ca6faa393c31da33b8a4e6c41fc84c13
  • https://git.kernel.org/stable/c/daf8e3b253aa760ff9e96c7768a464bc1d6b3c90

Related News (2 articles)

Tier C
VulDB2h ago
CVE-2026-31406 | Linux Kernel up to 6.12.79/6.18.20/6.19.10/7.0-rc5 xfrm_nat_keepalive_net_fini state issue
→ No new info (linked only)
Tier C
Linux Kernel CVEs3h ago
CVE-2026-31406: xfrm: Fix work re-schedule after cancel in xfrm_nat_keepalive_net_fini()
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
Patch available
32d0f44c2f14d60fe8e920e69a28c11051543ec12255ed6adbc3100d2c4a83abd9d0396d04b8779221f2fc49ca6faa393c31da33b8a4e6c41fc84c13daf8e3b253aa760ff9e96c7768a464bc1d6b3c9006.12.806.18.216.19.117.0-rc6
PublishedApr 6, 2026
Last enriched2h agov2
Trending Score31
Source articles2
Independent2
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23444EXP
wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure
Trending: 56
NONECVE-2026-31410EXP
ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION
Trending: 51
NONECVE-2026-23472EXP
serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN
Trending: 48
CRITICALCVE-2026-23442
ipv6: add NULL checks for idev in SRv6 paths
Trending: 41
CRITICALCVE-2026-23473
io_uring/poll: fix multishot recv missing EOF on wakeup race
Trending: 41

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 6, 2026
Discovered by ZDM
Apr 6, 2026
Updated: affectedVersions
Apr 6, 2026
Patch Available
Apr 6, 2026

Version History

v2
Last enriched 2h ago
v2Tier C2h ago

Updated description with critical severity, new affected versions, and corrected exploit availability.

affectedVersions
via VulDB
v13h ago

Initial creation