PT-2026-35015 · Linux · Linux
Published
2026-04-24
·
Updated
2026-04-24
·
CVE-2026-31663
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
xfrm: hold dev ref until after transport finish NF HOOK
After async crypto completes, xfrm input resume() calls dev put()
immediately on re-entry before the skb reaches transport finish.
The skb->dev pointer is then used inside NF HOOK and its okfn,
which can race with device teardown.
Remove the dev put from the async resumption entry and instead
drop the reference after the NF HOOK call in transport finish,
using a saved device pointer since NF HOOK may consume the skb.
This covers NF DROP, NF QUEUE and NF STOLEN paths that skip
the okfn.
For non-transport exits (decaps, gro, drop) and secondary
async return points, release the reference inline when
async is set.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux