Description
In the Linux kernel, the following vulnerability has been resolved:

esp: fix skb leak with espintcp and async crypto

When the TX queue for espintcp is full, esp_output_tail_tcp will
return an error and not free the skb, because with synchronous crypto,
the common xfrm output code will drop the packet for us.

With async crypto (esp_output_done), we need to drop the skb when
esp_output_tail_tcp returns an error.
Published: 2026-04-22
Score: 7.0 High
EPSS: n/a
KEV: No
Impact: Remote Denial of Service via Memory Leak
Action: Apply patch
AI Analysis

Impact

This bug involves the Linux kernel's ESP over TCP (espintcp) module. When the transmit queue reaches capacity, esp_output_tail_tcp returns an error but fails to free the associated socket buffer (skb). With synchronous crypto, a subsequent common xfrm output drop handles the cleanup, but with asynchronous crypto (esp_output_done) the skb is never freed. The resulting leak accumulates unreferenced skbs in memory. Over time, unbounded accumulation can exhaust kernel memory, destabilizing the system or allowing an attacker to trigger a denial‑of‑service by exhausting resources. The weakness maps to CWE‑459: Resource Leak.

Affected Systems

The flaw exists in the Linux kernel code that implements ESP over TCP. All distributions packaging unpatched Linux kernels are potentially affected; the precise version range is not specified in the advisory. Any system running the old kernel build that handles IPsec over TCP and uses asynchronous crypto code is susceptible. The vulnerability affects the kernel itself rather than user space applications.

Risk and Exploitability

Because EPSS is not available and the vulnerability is not listed in the CISA KEV catalog, the attack surface is not known to be actively exploited. However, the bug can be triggered by sending a high volume of ESP‑encrypted TCP packets that fill the transmit queue. Thus remote attackers who can inject such traffic could drain memory resources over time. While no public exploit is demonstrated, the combination of a resource leak and potential for sustained traffic makes it a medium‑to‑high risk for vulnerable hosts. Administrators should treat this as a potential denial‑of‑service scenario until a patch is applied.

Generated by OpenCVE AI on April 22, 2026 at 18:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the espintcp skb leak fix (e.g., apply the latest kernel patch series from the vendor).
  • If immediate kernel upgrade is not possible, restrict or disable ESP over TCP traffic, or enforce strict rate limiting on incoming ESP packets.
  • Monitor kernel memory consumption and the number of skbs in the network stack; investigate and alert if unexpected growth is observed.

Generated by OpenCVE AI on April 22, 2026 at 18:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Wed, 22 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-459

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: esp: fix skb leak with espintcp and async crypto When the TX queue for espintcp is full, esp_output_tail_tcp will return an error and not free the skb, because with synchronous crypto, the common xfrm output code will drop the packet for us. With async crypto (esp_output_done), we need to drop the skb when esp_output_tail_tcp returns an error.
Title esp: fix skb leak with espintcp and async crypto
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-22T13:54:34.191Z

Reserved: 2026-03-09T15:48:24.108Z

Link: CVE-2026-31518

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-22T14:16:51.410

Modified: 2026-04-22T14:16:51.410

Link: CVE-2026-31518

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31518 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T18:45:24Z

Weaknesses