X.509: Fix out-of-bounds access when parsing extensions
Summary
| CVE | CVE-2026-31430 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-20 10:16:16 UTC |
| Updated | 2026-04-20 10:16:16 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
X.509: Fix out-of-bounds access when parsing extensions
Leo reports an out-of-bounds access when parsing a certificate with
empty Basic Constraints or Key Usage extension because the first byte of
the extension is read before checking its length. Fix it.
The bug can be triggered by an unprivileged user by submitting a
specially crafted certificate to the kernel through the keyrings(7) API.
Leo has demonstrated this with a proof-of-concept program responsibly
disclosed off-list. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 30eae2b037af54b24109dcaea21db46f6285c69b 672b526def1f94c1be8eb11b885b803da0d8c2f1 git |
Not specified |
| CNA |
Linux |
Linux |
affected 30eae2b037af54b24109dcaea21db46f6285c69b 30ab358fad0c7daa1d282ec48089901b21b36a20 git |
Not specified |
| CNA |
Linux |
Linux |
affected 30eae2b037af54b24109dcaea21db46f6285c69b 206121294b9cf27f0589857f80d64f87e496ffb2 git |
Not specified |
| CNA |
Linux |
Linux |
affected 30eae2b037af54b24109dcaea21db46f6285c69b 7fb4dadc2734f4020d7543d688b8d49c8e569c61 git |
Not specified |
| CNA |
Linux |
Linux |
affected 30eae2b037af54b24109dcaea21db46f6285c69b d702c3408213bb12bd570bb97204d8340d141c51 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6.4 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.4 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.135 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.82 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.23 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.13 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/206121294b9cf27f0589857f80d64f87e496ffb2 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/d702c3408213bb12bd570bb97204d8340d141c51 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/7fb4dadc2734f4020d7543d688b8d49c8e569c61 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/30ab358fad0c7daa1d282ec48089901b21b36a20 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/672b526def1f94c1be8eb11b885b803da0d8c2f1 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.