CVE-2026-43139 PUBLISHED

xfrm6: fix uninitialized saddr in xfrm6_get_saddr()

Assigner: Linux
Reserved: 01.05.2026 Published: 06.05.2026 Updated: 06.05.2026

In the Linux kernel, the following vulnerability has been resolved:

xfrm6: fix uninitialized saddr in xfrm6_get_saddr()

xfrm6_get_saddr() does not check the return value of ipv6_dev_get_saddr(). When ipv6_dev_get_saddr() fails to find a suitable source address (returns -EADDRNOTAVAIL), saddr->in6 is left uninitialized, but xfrm6_get_saddr() still returns 0 (success).

This causes the caller xfrm_tmpl_resolve_one() to use the uninitialized address in xfrm_state_find(), triggering KMSAN warning:

===================================================== BUG: KMSAN: uninit-value in xfrm_state_find+0x2424/0xa940 xfrm_state_find+0x2424/0xa940 xfrm_resolve_and_create_bundle+0x906/0x5a20 xfrm_lookup_with_ifid+0xcc0/0x3770 xfrm_lookup_route+0x63/0x2b0 ip_route_output_flow+0x1ce/0x270 udp_sendmsg+0x2ce1/0x3400 inet_sendmsg+0x1ef/0x2a0 __sock_sendmsg+0x278/0x3d0 __sys_sendto+0x593/0x720 __x64_sys_sendto+0x130/0x200 x64_sys_call+0x332b/0x3e70 do_syscall_64+0xd3/0xf80 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Local variable tmp.i.i created at: xfrm_resolve_and_create_bundle+0x3e3/0x5a20 xfrm_lookup_with_ifid+0xcc0/0x3770 =====================================================

Fix by checking the return value of ipv6_dev_get_saddr() and propagating the error.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from a1e59abf824969554b90facd44a4ab16e265afa4 to 4f28141786e1fe884ce42a5197ba9beed540f0ea (excl.)
  • affected from a1e59abf824969554b90facd44a4ab16e265afa4 to 6535867673bf301d52aa00593a4d1d18cc3922fa (excl.)
  • affected from a1e59abf824969554b90facd44a4ab16e265afa4 to eb2ee15290af14c60b45cf2b73f5687d1d077d9b (excl.)
  • affected from a1e59abf824969554b90facd44a4ab16e265afa4 to 719918fc88df6da023dfff370cd965151a5afd7f (excl.)
  • affected from a1e59abf824969554b90facd44a4ab16e265afa4 to dc0abce055134cb83b0d981d31ceb20dda419787 (excl.)
  • affected from a1e59abf824969554b90facd44a4ab16e265afa4 to c7221e7bd8fc2ef38a0b27be580d9d202281306b (excl.)
  • affected from a1e59abf824969554b90facd44a4ab16e265afa4 to 3dcd1664ac15eee6a690daec7c4ffc59190406f7 (excl.)
  • affected from a1e59abf824969554b90facd44a4ab16e265afa4 to 1799d8abeabc68ec05679292aaf6cba93b343c05 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 2.6.19 is affected
  • unaffected from 0 to 2.6.19 (excl.)
  • unaffected from 5.10.252 to 5.10.* (incl.)
  • unaffected from 5.15.202 to 5.15.* (incl.)
  • unaffected from 6.1.165 to 6.1.* (incl.)
  • unaffected from 6.6.128 to 6.6.* (incl.)
  • unaffected from 6.12.75 to 6.12.* (incl.)
  • unaffected from 6.18.16 to 6.18.* (incl.)
  • unaffected from 6.19.6 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References