CVE-2026-31671

In the Linux kernel, the following vulnerability has been resolved: xfrm_user: fix info leak in build_report() struct xfrm_user_report is a __u8 proto field followed by a struct xfrm_selector which means there is three "empty" bytes of padding, but the padding is never zeroed before copying to userspace. Fix that up by zeroing the structure before setting individual member variables.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

History

27 Apr 2026, 20:11

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0616314b3b34f24cbb91da8c6bd8bcdc4c8592f9 - () https://git.kernel.org/stable/c/0616314b3b34f24cbb91da8c6bd8bcdc4c8592f9 - Patch
References () https://git.kernel.org/stable/c/0a30dceb0e1f0c480d2482e6d7cebf8aebb6eb72 - () https://git.kernel.org/stable/c/0a30dceb0e1f0c480d2482e6d7cebf8aebb6eb72 - Patch
References () https://git.kernel.org/stable/c/6c55714c931051cd7f4839c19ce0867179fd22fe - () https://git.kernel.org/stable/c/6c55714c931051cd7f4839c19ce0867179fd22fe - Patch
References () https://git.kernel.org/stable/c/716c546e88cfe49d841658240e10cb57bc50a2cc - () https://git.kernel.org/stable/c/716c546e88cfe49d841658240e10cb57bc50a2cc - Patch
References () https://git.kernel.org/stable/c/d10119968d0e1f2b669604baf2a8b5fdb72fa6b4 - () https://git.kernel.org/stable/c/d10119968d0e1f2b669604baf2a8b5fdb72fa6b4 - Patch
References () https://git.kernel.org/stable/c/d27c02eec529f78055a46a5c9e6c62684382b2d8 - () https://git.kernel.org/stable/c/d27c02eec529f78055a46a5c9e6c62684382b2d8 - Patch
References () https://git.kernel.org/stable/c/e0c8542c3d097ed4205ded51868195d5d6ddac62 - () https://git.kernel.org/stable/c/e0c8542c3d097ed4205ded51868195d5d6ddac62 - Patch
References () https://git.kernel.org/stable/c/ff5ee507302303b15859753c3e0d67d38fd12c88 - () https://git.kernel.org/stable/c/ff5ee507302303b15859753c3e0d67d38fd12c88 - Patch
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel

24 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 15:16

Updated : 2026-04-27 20:11


NVD link : CVE-2026-31671

Mitre link : CVE-2026-31671

CVE.ORG link : CVE-2026-31671


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime