CVE-2026-31664
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/04/2026
Last modified:
27/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xfrm: clear trailing padding in build_polexpire()<br />
<br />
build_expire() clears the trailing padding bytes of struct<br />
xfrm_user_expire after setting the hard field via memset_after(),<br />
but the analogous function build_polexpire() does not do this for<br />
struct xfrm_user_polexpire.<br />
<br />
The padding bytes after the __u8 hard field are left<br />
uninitialized from the heap allocation, and are then sent to<br />
userspace via netlink multicast to XFRMNLGRP_EXPIRE listeners,<br />
leaking kernel heap memory contents.<br />
<br />
Add the missing memset_after() call, matching build_expire().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.12.1 (including) | 6.1.169 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.135 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.82 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.23 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/71a98248c63c535eaa4d4c22f099b68d902006d0
- https://git.kernel.org/stable/c/ac6985903db047eaff54db929e4bf6b06782788e
- https://git.kernel.org/stable/c/b1dfd6b27df35ef4f87825aa5f607378d23ff0f2
- https://git.kernel.org/stable/c/c221ed63a2769a0af8bd849dfe25740048f34ef4
- https://git.kernel.org/stable/c/e1af65c669ebb1666c54576614c01a7f9ffcfff6
- https://git.kernel.org/stable/c/eda30846ea54f8ed218468e5480c8305ca645e37



