CVE-2026-31698
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-787
Escritura fuera de límites
Fecha de publicación:
01/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
crypto: ccp: Don&#39;t attempt to copy PDH cert to userspace if PSP command failed<br />
<br />
When retrieving the PDH cert, don&#39;t attempt to copy the blobs to userspace<br />
if the firmware command failed. If the failure was due to an invalid<br />
length, i.e. the userspace buffer+length was too small, copying the number<br />
of bytes _firmware_ requires will overflow the kernel-allocated buffer and<br />
leak data to userspace.<br />
<br />
BUG: KASAN: slab-out-of-bounds in instrument_copy_to_user ../include/linux/instrumented.h:129 [inline]<br />
BUG: KASAN: slab-out-of-bounds in _inline_copy_to_user ../include/linux/uaccess.h:205 [inline]<br />
BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x66/0xa0 ../lib/usercopy.c:26<br />
Read of size 2084 at addr ffff8885c4ab8aa0 by task syz.0.186/21033<br />
<br />
CPU: 51 UID: 0 PID: 21033 Comm: syz.0.186 Tainted: G U O 7.0.0-smp-DEV #28 PREEMPTLAZY<br />
Tainted: [U]=USER, [O]=OOT_MODULE<br />
Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.84.12-0 11/17/2025<br />
Call Trace:<br />
<br />
dump_stack_lvl+0xc5/0x110 ../lib/dump_stack.c:120<br />
print_address_description ../mm/kasan/report.c:378 [inline]<br />
print_report+0xbc/0x260 ../mm/kasan/report.c:482<br />
kasan_report+0xa2/0xe0 ../mm/kasan/report.c:595<br />
check_region_inline ../mm/kasan/generic.c:-1 [inline]<br />
kasan_check_range+0x264/0x2c0 ../mm/kasan/generic.c:200<br />
instrument_copy_to_user ../include/linux/instrumented.h:129 [inline]<br />
_inline_copy_to_user ../include/linux/uaccess.h:205 [inline]<br />
_copy_to_user+0x66/0xa0 ../lib/usercopy.c:26<br />
copy_to_user ../include/linux/uaccess.h:236 [inline]<br />
sev_ioctl_do_pdh_export+0x3d3/0x7c0 ../drivers/crypto/ccp/sev-dev.c:2347<br />
sev_ioctl+0x2a2/0x490 ../drivers/crypto/ccp/sev-dev.c:2568<br />
vfs_ioctl ../fs/ioctl.c:51 [inline]<br />
__do_sys_ioctl ../fs/ioctl.c:597 [inline]<br />
__se_sys_ioctl+0x11d/0x1b0 ../fs/ioctl.c:583<br />
do_syscall_x64 ../arch/x86/entry/syscall_64.c:63 [inline]<br />
do_syscall_64+0xe0/0x800 ../arch/x86/entry/syscall_64.c:94<br />
entry_SYSCALL_64_after_hwframe+0x76/0x7e<br />
<br />
<br />
WARN if the driver says the command succeeded, but the firmware error code<br />
says otherwise, as __sev_do_cmd_locked() is expected to return -EIO on any<br />
firwmware error.
Impacto
Puntuación base 3.x
7.10
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.16 (incluyendo) | 6.6.136 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.84 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.25 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 7.0.2 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:7.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.1:rc2:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/051e51aa55fd4cdc3e8283cf4476aeeb5f563274
- https://git.kernel.org/stable/c/50808c13452dae43a2c90b1bbbf9daa16501ce70
- https://git.kernel.org/stable/c/78b97e43d0b3e674d9d49ae56937b11e2ba3fcaf
- https://git.kernel.org/stable/c/b5c14bd4da1f376f385722fe1da993f1edab6472
- https://git.kernel.org/stable/c/e76239fed3cffd6d304d8ca3ce23984fd24f57d3



