Description
In the Linux kernel, the following vulnerability has been resolved:

xfrm: iptfs: only publish mode_data after clone setup

iptfs_clone_state() stores x->mode_data before allocating the reorder
window. If that allocation fails, the code frees the cloned state and
returns -ENOMEM, leaving x->mode_data pointing at freed memory.

The xfrm clone unwind later runs destroy_state() through x->mode_data,
so the failed clone path tears down IPTFS state that clone_state()
already freed.

Keep the cloned IPTFS state private until all allocations succeed so
failed clones leave x->mode_data unset. The destroy path already
handles a NULL mode_data pointer.
Published: 2026-04-22
Score: n/a
EPSS: n/a
KEV: No
Impact: Use‑after‑free that can lead to kernel memory corruption and system crash
Action: Immediate Patch
AI Analysis

Impact

In the Linux kernel a failure to allocate an IPTFS reorder window leaves the mode_data pointer pointing to freed memory; subsequent teardown routines use this dangling pointer, creating a use‑after‑free condition. This bug can corrupt kernel state, potentially allowing privilege escalation or untrusted code execution, and can also cause the kernel to crash, resulting in a denial of service.

Affected Systems

The vulnerability is present in all kernel builds that contain the buggy xfrm:iptfs clone logic, and no specific version range is provided; any Linux system running a kernel prior to the patch that introduced the fix is affected. Users should check that their kernel contains commit 371a43c4ac70cac0de9f9b1fc5b1660b9565b9f1 or later.

Risk and Exploitability

The CVSS score is not disclosed, and the EPSS value is unavailable, but the bug involves kernel‑level memory corruption with local–realm exploitation potential. Because the vulnerability is a classic use‑after‑free (CWE‑416) that can crash or compromise a privileged process, its likelihood of exploitation is significant in environments with active IPsec/second‑level tunneling. It is not yet catalogued in CISA KEV, but it should be treated as a high‑risk kernel flaw until fully mitigated.

Generated by OpenCVE AI on April 22, 2026 at 18:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the kernel to a version that includes the commit that fixes the xfrm:iptfs clone logic
  • If IPTFS or IPsec is not required, disable these features or restrict their use through configuration or network policy
  • Enable kernel auditing and monitor system logs for IPsec‑related crashes or panics to detect exploitation attempts

Generated by OpenCVE AI on April 22, 2026 at 18:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 00:15:00 +0000


Wed, 22 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: xfrm: iptfs: only publish mode_data after clone setup iptfs_clone_state() stores x->mode_data before allocating the reorder window. If that allocation fails, the code frees the cloned state and returns -ENOMEM, leaving x->mode_data pointing at freed memory. The xfrm clone unwind later runs destroy_state() through x->mode_data, so the failed clone path tears down IPTFS state that clone_state() already freed. Keep the cloned IPTFS state private until all allocations succeed so failed clones leave x->mode_data unset. The destroy path already handles a NULL mode_data pointer.
Title xfrm: iptfs: only publish mode_data after clone setup
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-22T13:53:59.595Z

Reserved: 2026-03-09T15:48:24.098Z

Link: CVE-2026-31471

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-22T14:16:43.610

Modified: 2026-04-22T14:16:43.610

Link: CVE-2026-31471

cve-icon Redhat

Severity :

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31471 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T19:00:08Z

Weaknesses