CVE-2026-31697
Buffer Overflow in Linux Kernel CCP Driver
Publication date: 2026-05-01
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.7 (inc) to 6.12.84 (exc) |
| linux | linux_kernel | 7.1 |
| linux | linux_kernel | 7.1 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.25 (exc) |
| linux | linux_kernel | From 6.19 (inc) to 7.0.2 (exc) |
| linux | linux_kernel | From 5.2 (inc) to 6.6.136 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's crypto CCP driver. When retrieving the CPU ID, if the firmware command fails, the kernel should not attempt to copy the ID data to userspace. However, if the failure is due to an invalid length (meaning the userspace buffer is too small), the kernel copies more bytes than the allocated buffer size, causing a buffer overflow. This overflow can lead to leaking kernel memory data to userspace.
How can this vulnerability impact me? :
The vulnerability can cause sensitive kernel memory data to be leaked to userspace applications. This could expose confidential information or internal kernel data, potentially aiding attackers in further exploiting the system or gaining unauthorized access.