CVE-2026-31684

Source
https://cve.org/CVERecord?id=CVE-2026-31684
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31684.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-31684
Downstream
Published
2026-04-25T08:47:01.555Z
Modified
2026-04-26T04:22:21.560178Z
Summary
net: sched: act_csum: validate nested VLAN headers
Details

In the Linux kernel, the following vulnerability has been resolved:

net: sched: act_csum: validate nested VLAN headers

tcfcsumact() walks nested VLAN headers directly from skb->data when an skb still carries in-payload VLAN tags. The current code reads vlan->hvlanencapsulatedproto and then pulls VLANHLEN bytes without first ensuring that the full VLAN header is present in the linear area.

If only part of an inner VLAN header is linearized, accessing hvlanencapsulatedproto reads past the linear area, and the following skbpull(VLAN_HLEN) may violate skb invariants.

Fix this by requiring pskbmaypull(skb, VLAN_HLEN) before accessing and pulling each nested VLAN header. If the header still is not fully available, drop the packet through the existing error path.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31684.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2ecba2d1e45b24620a7c3df9531895cf68d5dec6
Fixed
a69738efea0996d05a3c7d2178551b891744df1b
Fixed
ec4930979b3f7bbeb7af5744599fc6603a4dba62
Fixed
3d165d975305cf76ff0b10a3c798fb31e5f5f9a5
Fixed
c842743d073bdd683606cb414eb0ca84465dd834
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
3764bfae5056e95617b6ee074129297e11710886

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31684.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.1.0
Fixed
6.12.83
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.24
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.14

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31684.json"