xfrm_user: fix info leak in build_mapping()
Summary
| CVE | CVE-2026-43089 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-06 10:16:22 UTC |
| Updated | 2026-05-06 13:08:07 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
xfrm_user: fix info leak in build_mapping()
struct xfrm_usersa_id has a one-byte padding hole after the proto
field, which ends up never getting set to zero before copying out to
userspace. Fix that up by zeroing out the whole structure before
setting individual variables. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 3a2dfbe8acb154905fdc2fd03ec56df42e6c4cc4 d3125c541a96fb3c0fc7210112684baf22b6c24d git |
Not specified |
| CNA |
Linux |
Linux |
affected 3a2dfbe8acb154905fdc2fd03ec56df42e6c4cc4 5a1a4b049ddde41466ccac0daeec326254b133f2 git |
Not specified |
| CNA |
Linux |
Linux |
affected 3a2dfbe8acb154905fdc2fd03ec56df42e6c4cc4 f779a6b6cdb6e12baa0663063ac59ab2a8f20c0c git |
Not specified |
| CNA |
Linux |
Linux |
affected 3a2dfbe8acb154905fdc2fd03ec56df42e6c4cc4 700c9622b23c33b5933e6dcea816492c064e4e10 git |
Not specified |
| CNA |
Linux |
Linux |
affected 3a2dfbe8acb154905fdc2fd03ec56df42e6c4cc4 1beb76b2053b68c491b78370794b8ff63c8f8c02 git |
Not specified |
| CNA |
Linux |
Linux |
affected 2.6.29 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 2.6.29 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.136 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.83 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.24 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.14 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/700c9622b23c33b5933e6dcea816492c064e4e10 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/5a1a4b049ddde41466ccac0daeec326254b133f2 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/d3125c541a96fb3c0fc7210112684baf22b6c24d |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/1beb76b2053b68c491b78370794b8ff63c8f8c02 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/f779a6b6cdb6e12baa0663063ac59ab2a8f20c0c |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.