CVE-2026-31471 PUBLISHED

xfrm: iptfs: only publish mode_data after clone setup

Assigner: Linux
Reserved: 09.03.2026 Published: 22.04.2026 Updated: 22.04.2026

In the Linux kernel, the following vulnerability has been resolved:

xfrm: iptfs: only publish mode_data after clone setup

iptfs_clone_state() stores x->mode_data before allocating the reorder window. If that allocation fails, the code frees the cloned state and returns -ENOMEM, leaving x->mode_data pointing at freed memory.

The xfrm clone unwind later runs destroy_state() through x->mode_data, so the failed clone path tears down IPTFS state that clone_state() already freed.

Keep the cloned IPTFS state private until all allocations succeed so failed clones leave x->mode_data unset. The destroy path already handles a NULL mode_data pointer.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 6be02e3e4f376fea468846c8562655ca5ee18204 to 371a43c4ac70cac0de9f9b1fc5b1660b9565b9f1 (excl.)
  • affected from 6be02e3e4f376fea468846c8562655ca5ee18204 to 5784a1e2889c9525a8f036cb586930e232170bf7 (excl.)
  • affected from 6be02e3e4f376fea468846c8562655ca5ee18204 to d849a2f7309fc0616e79d13b008b0a47e0458b6e (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.14 is affected
  • unaffected from 0 to 6.14 (excl.)
  • unaffected from 6.18.21 to 6.18.* (incl.)
  • unaffected from 6.19.11 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References