{"api_version":"1","generated_at":"2026-04-20T14:03:24+00:00","cve":"CVE-2026-31430","urls":{"html":"https://cve.report/CVE-2026-31430","api":"https://cve.report/api/cve/CVE-2026-31430.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-31430","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-31430"},"summary":{"title":"X.509: Fix out-of-bounds access when parsing extensions","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nX.509: Fix out-of-bounds access when parsing extensions\n\nLeo reports an out-of-bounds access when parsing a certificate with\nempty Basic Constraints or Key Usage extension because the first byte of\nthe extension is read before checking its length.  Fix it.\n\nThe bug can be triggered by an unprivileged user by submitting a\nspecially crafted certificate to the kernel through the keyrings(7) API.\nLeo has demonstrated this with a proof-of-concept program responsibly\ndisclosed off-list.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-04-20 10:16:16","updated_at":"2026-04-20 10:16:16"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/206121294b9cf27f0589857f80d64f87e496ffb2","name":"https://git.kernel.org/stable/c/206121294b9cf27f0589857f80d64f87e496ffb2","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/d702c3408213bb12bd570bb97204d8340d141c51","name":"https://git.kernel.org/stable/c/d702c3408213bb12bd570bb97204d8340d141c51","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/7fb4dadc2734f4020d7543d688b8d49c8e569c61","name":"https://git.kernel.org/stable/c/7fb4dadc2734f4020d7543d688b8d49c8e569c61","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/30ab358fad0c7daa1d282ec48089901b21b36a20","name":"https://git.kernel.org/stable/c/30ab358fad0c7daa1d282ec48089901b21b36a20","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/672b526def1f94c1be8eb11b885b803da0d8c2f1","name":"https://git.kernel.org/stable/c/672b526def1f94c1be8eb11b885b803da0d8c2f1","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-31430","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31430","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 30eae2b037af54b24109dcaea21db46f6285c69b 672b526def1f94c1be8eb11b885b803da0d8c2f1 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 30eae2b037af54b24109dcaea21db46f6285c69b 30ab358fad0c7daa1d282ec48089901b21b36a20 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 30eae2b037af54b24109dcaea21db46f6285c69b 206121294b9cf27f0589857f80d64f87e496ffb2 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 30eae2b037af54b24109dcaea21db46f6285c69b 7fb4dadc2734f4020d7543d688b8d49c8e569c61 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 30eae2b037af54b24109dcaea21db46f6285c69b d702c3408213bb12bd570bb97204d8340d141c51 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.4","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.4 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.135 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.82 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.23 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.13 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["crypto/asymmetric_keys/x509_cert_parser.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"672b526def1f94c1be8eb11b885b803da0d8c2f1","status":"affected","version":"30eae2b037af54b24109dcaea21db46f6285c69b","versionType":"git"},{"lessThan":"30ab358fad0c7daa1d282ec48089901b21b36a20","status":"affected","version":"30eae2b037af54b24109dcaea21db46f6285c69b","versionType":"git"},{"lessThan":"206121294b9cf27f0589857f80d64f87e496ffb2","status":"affected","version":"30eae2b037af54b24109dcaea21db46f6285c69b","versionType":"git"},{"lessThan":"7fb4dadc2734f4020d7543d688b8d49c8e569c61","status":"affected","version":"30eae2b037af54b24109dcaea21db46f6285c69b","versionType":"git"},{"lessThan":"d702c3408213bb12bd570bb97204d8340d141c51","status":"affected","version":"30eae2b037af54b24109dcaea21db46f6285c69b","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["crypto/asymmetric_keys/x509_cert_parser.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.4"},{"lessThan":"6.4","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.135","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.82","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.23","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.13","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.135","versionStartIncluding":"6.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.82","versionStartIncluding":"6.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.23","versionStartIncluding":"6.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.13","versionStartIncluding":"6.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.4","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nX.509: Fix out-of-bounds access when parsing extensions\n\nLeo reports an out-of-bounds access when parsing a certificate with\nempty Basic Constraints or Key Usage extension because the first byte of\nthe extension is read before checking its length.  Fix it.\n\nThe bug can be triggered by an unprivileged user by submitting a\nspecially crafted certificate to the kernel through the keyrings(7) API.\nLeo has demonstrated this with a proof-of-concept program responsibly\ndisclosed off-list."}],"providerMetadata":{"dateUpdated":"2026-04-20T09:43:03.919Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/672b526def1f94c1be8eb11b885b803da0d8c2f1"},{"url":"https://git.kernel.org/stable/c/30ab358fad0c7daa1d282ec48089901b21b36a20"},{"url":"https://git.kernel.org/stable/c/206121294b9cf27f0589857f80d64f87e496ffb2"},{"url":"https://git.kernel.org/stable/c/7fb4dadc2734f4020d7543d688b8d49c8e569c61"},{"url":"https://git.kernel.org/stable/c/d702c3408213bb12bd570bb97204d8340d141c51"}],"title":"X.509: Fix out-of-bounds access when parsing extensions","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-31430","datePublished":"2026-04-20T09:43:03.919Z","dateReserved":"2026-03-09T15:48:24.089Z","dateUpdated":"2026-04-20T09:43:03.919Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-20 10:16:16","lastModifiedDate":"2026-04-20 10:16:16","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"31430","Ordinal":"1","Title":"X.509: Fix out-of-bounds access when parsing extensions","CVE":"CVE-2026-31430","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"31430","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nX.509: Fix out-of-bounds access when parsing extensions\n\nLeo reports an out-of-bounds access when parsing a certificate with\nempty Basic Constraints or Key Usage extension because the first byte of\nthe extension is read before checking its length.  Fix it.\n\nThe bug can be triggered by an unprivileged user by submitting a\nspecially crafted certificate to the kernel through the keyrings(7) API.\nLeo has demonstrated this with a proof-of-concept program responsibly\ndisclosed off-list.","Type":"Description","Title":"X.509: Fix out-of-bounds access when parsing extensions"}]}}}