CVE-2026-43139 (GCVE-0-2026-43139)
Vulnerability from cvelistv5 – Published: 2026-05-06 11:27 – Updated: 2026-05-08 12:40
VLAI?
Title
xfrm6: fix uninitialized saddr in xfrm6_get_saddr()
Summary
In the Linux kernel, the following vulnerability has been resolved:
xfrm6: fix uninitialized saddr in xfrm6_get_saddr()
xfrm6_get_saddr() does not check the return value of
ipv6_dev_get_saddr(). When ipv6_dev_get_saddr() fails to find a suitable
source address (returns -EADDRNOTAVAIL), saddr->in6 is left
uninitialized, but xfrm6_get_saddr() still returns 0 (success).
This causes the caller xfrm_tmpl_resolve_one() to use the uninitialized
address in xfrm_state_find(), triggering KMSAN warning:
=====================================================
BUG: KMSAN: uninit-value in xfrm_state_find+0x2424/0xa940
xfrm_state_find+0x2424/0xa940
xfrm_resolve_and_create_bundle+0x906/0x5a20
xfrm_lookup_with_ifid+0xcc0/0x3770
xfrm_lookup_route+0x63/0x2b0
ip_route_output_flow+0x1ce/0x270
udp_sendmsg+0x2ce1/0x3400
inet_sendmsg+0x1ef/0x2a0
__sock_sendmsg+0x278/0x3d0
__sys_sendto+0x593/0x720
__x64_sys_sendto+0x130/0x200
x64_sys_call+0x332b/0x3e70
do_syscall_64+0xd3/0xf80
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Local variable tmp.i.i created at:
xfrm_resolve_and_create_bundle+0x3e3/0x5a20
xfrm_lookup_with_ifid+0xcc0/0x3770
=====================================================
Fix by checking the return value of ipv6_dev_get_saddr() and propagating
the error.
Severity ?
8.6 (High)
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
a1e59abf824969554b90facd44a4ab16e265afa4 , < 4f28141786e1fe884ce42a5197ba9beed540f0ea
(git)
Affected: a1e59abf824969554b90facd44a4ab16e265afa4 , < 6535867673bf301d52aa00593a4d1d18cc3922fa (git) Affected: a1e59abf824969554b90facd44a4ab16e265afa4 , < eb2ee15290af14c60b45cf2b73f5687d1d077d9b (git) Affected: a1e59abf824969554b90facd44a4ab16e265afa4 , < 719918fc88df6da023dfff370cd965151a5afd7f (git) Affected: a1e59abf824969554b90facd44a4ab16e265afa4 , < dc0abce055134cb83b0d981d31ceb20dda419787 (git) Affected: a1e59abf824969554b90facd44a4ab16e265afa4 , < c7221e7bd8fc2ef38a0b27be580d9d202281306b (git) Affected: a1e59abf824969554b90facd44a4ab16e265afa4 , < 3dcd1664ac15eee6a690daec7c4ffc59190406f7 (git) Affected: a1e59abf824969554b90facd44a4ab16e265afa4 , < 1799d8abeabc68ec05679292aaf6cba93b343c05 (git) |
|||||||
|
|||||||||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/ipv6/xfrm6_policy.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "4f28141786e1fe884ce42a5197ba9beed540f0ea",
"status": "affected",
"version": "a1e59abf824969554b90facd44a4ab16e265afa4",
"versionType": "git"
},
{
"lessThan": "6535867673bf301d52aa00593a4d1d18cc3922fa",
"status": "affected",
"version": "a1e59abf824969554b90facd44a4ab16e265afa4",
"versionType": "git"
},
{
"lessThan": "eb2ee15290af14c60b45cf2b73f5687d1d077d9b",
"status": "affected",
"version": "a1e59abf824969554b90facd44a4ab16e265afa4",
"versionType": "git"
},
{
"lessThan": "719918fc88df6da023dfff370cd965151a5afd7f",
"status": "affected",
"version": "a1e59abf824969554b90facd44a4ab16e265afa4",
"versionType": "git"
},
{
"lessThan": "dc0abce055134cb83b0d981d31ceb20dda419787",
"status": "affected",
"version": "a1e59abf824969554b90facd44a4ab16e265afa4",
"versionType": "git"
},
{
"lessThan": "c7221e7bd8fc2ef38a0b27be580d9d202281306b",
"status": "affected",
"version": "a1e59abf824969554b90facd44a4ab16e265afa4",
"versionType": "git"
},
{
"lessThan": "3dcd1664ac15eee6a690daec7c4ffc59190406f7",
"status": "affected",
"version": "a1e59abf824969554b90facd44a4ab16e265afa4",
"versionType": "git"
},
{
"lessThan": "1799d8abeabc68ec05679292aaf6cba93b343c05",
"status": "affected",
"version": "a1e59abf824969554b90facd44a4ab16e265afa4",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"net/ipv6/xfrm6_policy.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "2.6.19"
},
{
"lessThan": "2.6.19",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.252",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.202",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.165",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.128",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.75",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.16",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.252",
"versionStartIncluding": "2.6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.202",
"versionStartIncluding": "2.6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.165",
"versionStartIncluding": "2.6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.128",
"versionStartIncluding": "2.6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.75",
"versionStartIncluding": "2.6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.16",
"versionStartIncluding": "2.6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.6",
"versionStartIncluding": "2.6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"versionStartIncluding": "2.6.19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm6: fix uninitialized saddr in xfrm6_get_saddr()\n\nxfrm6_get_saddr() does not check the return value of\nipv6_dev_get_saddr(). When ipv6_dev_get_saddr() fails to find a suitable\nsource address (returns -EADDRNOTAVAIL), saddr-\u003ein6 is left\nuninitialized, but xfrm6_get_saddr() still returns 0 (success).\n\nThis causes the caller xfrm_tmpl_resolve_one() to use the uninitialized\naddress in xfrm_state_find(), triggering KMSAN warning:\n\n=====================================================\nBUG: KMSAN: uninit-value in xfrm_state_find+0x2424/0xa940\n xfrm_state_find+0x2424/0xa940\n xfrm_resolve_and_create_bundle+0x906/0x5a20\n xfrm_lookup_with_ifid+0xcc0/0x3770\n xfrm_lookup_route+0x63/0x2b0\n ip_route_output_flow+0x1ce/0x270\n udp_sendmsg+0x2ce1/0x3400\n inet_sendmsg+0x1ef/0x2a0\n __sock_sendmsg+0x278/0x3d0\n __sys_sendto+0x593/0x720\n __x64_sys_sendto+0x130/0x200\n x64_sys_call+0x332b/0x3e70\n do_syscall_64+0xd3/0xf80\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nLocal variable tmp.i.i created at:\n xfrm_resolve_and_create_bundle+0x3e3/0x5a20\n xfrm_lookup_with_ifid+0xcc0/0x3770\n=====================================================\n\nFix by checking the return value of ipv6_dev_get_saddr() and propagating\nthe error."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-08T12:40:50.383Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/4f28141786e1fe884ce42a5197ba9beed540f0ea"
},
{
"url": "https://git.kernel.org/stable/c/6535867673bf301d52aa00593a4d1d18cc3922fa"
},
{
"url": "https://git.kernel.org/stable/c/eb2ee15290af14c60b45cf2b73f5687d1d077d9b"
},
{
"url": "https://git.kernel.org/stable/c/719918fc88df6da023dfff370cd965151a5afd7f"
},
{
"url": "https://git.kernel.org/stable/c/dc0abce055134cb83b0d981d31ceb20dda419787"
},
{
"url": "https://git.kernel.org/stable/c/c7221e7bd8fc2ef38a0b27be580d9d202281306b"
},
{
"url": "https://git.kernel.org/stable/c/3dcd1664ac15eee6a690daec7c4ffc59190406f7"
},
{
"url": "https://git.kernel.org/stable/c/1799d8abeabc68ec05679292aaf6cba93b343c05"
}
],
"title": "xfrm6: fix uninitialized saddr in xfrm6_get_saddr()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-43139",
"datePublished": "2026-05-06T11:27:24.898Z",
"dateReserved": "2026-05-01T14:12:55.988Z",
"dateUpdated": "2026-05-08T12:40:50.383Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-43139",
"date": "2026-05-08",
"epss": "0.00024",
"percentile": "0.06984"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-43139\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-06T12:16:31.227\",\"lastModified\":\"2026-05-08T13:16:40.990\",\"vulnStatus\":\"Undergoing Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nxfrm6: fix uninitialized saddr in xfrm6_get_saddr()\\n\\nxfrm6_get_saddr() does not check the return value of\\nipv6_dev_get_saddr(). When ipv6_dev_get_saddr() fails to find a suitable\\nsource address (returns -EADDRNOTAVAIL), saddr-\u003ein6 is left\\nuninitialized, but xfrm6_get_saddr() still returns 0 (success).\\n\\nThis causes the caller xfrm_tmpl_resolve_one() to use the uninitialized\\naddress in xfrm_state_find(), triggering KMSAN warning:\\n\\n=====================================================\\nBUG: KMSAN: uninit-value in xfrm_state_find+0x2424/0xa940\\n xfrm_state_find+0x2424/0xa940\\n xfrm_resolve_and_create_bundle+0x906/0x5a20\\n xfrm_lookup_with_ifid+0xcc0/0x3770\\n xfrm_lookup_route+0x63/0x2b0\\n ip_route_output_flow+0x1ce/0x270\\n udp_sendmsg+0x2ce1/0x3400\\n inet_sendmsg+0x1ef/0x2a0\\n __sock_sendmsg+0x278/0x3d0\\n __sys_sendto+0x593/0x720\\n __x64_sys_sendto+0x130/0x200\\n x64_sys_call+0x332b/0x3e70\\n do_syscall_64+0xd3/0xf80\\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\\n\\nLocal variable tmp.i.i created at:\\n xfrm_resolve_and_create_bundle+0x3e3/0x5a20\\n xfrm_lookup_with_ifid+0xcc0/0x3770\\n=====================================================\\n\\nFix by checking the return value of ipv6_dev_get_saddr() and propagating\\nthe error.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.7}]},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1799d8abeabc68ec05679292aaf6cba93b343c05\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3dcd1664ac15eee6a690daec7c4ffc59190406f7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4f28141786e1fe884ce42a5197ba9beed540f0ea\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6535867673bf301d52aa00593a4d1d18cc3922fa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/719918fc88df6da023dfff370cd965151a5afd7f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c7221e7bd8fc2ef38a0b27be580d9d202281306b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dc0abce055134cb83b0d981d31ceb20dda419787\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/eb2ee15290af14c60b45cf2b73f5687d1d077d9b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…