CVE-2026-43089
Received Received - Intake
Memory Corruption in Linux Kernel XFRM User Subsystem

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: xfrm_user: fix info leak in build_mapping() struct xfrm_usersa_id has a one-byte padding hole after the proto field, which ends up never getting set to zero before copying out to userspace. Fix that up by zeroing out the whole structure before setting individual variables.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux_kernel linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's xfrm_user component, specifically in the build_mapping() function.

The issue arises because the struct xfrm_usersa_id contains a one-byte padding hole after the proto field. This padding byte is never initialized to zero before the structure is copied out to userspace.

As a result, uninitialized memory data can be leaked to userspace, potentially exposing sensitive information.

The fix involves zeroing out the entire structure before setting individual variables, ensuring no unintended data is leaked.


How can this vulnerability impact me? :

This vulnerability can lead to an information leak where uninitialized memory data is exposed to userspace.

Such leaks can potentially reveal sensitive or confidential information that resides in kernel memory, which could be exploited by attackers to gain insights into the system or escalate privileges.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart