VYPR
High severity7.8CISA KEVNVD Advisory· Published Apr 22, 2026· Updated May 12, 2026

CVE-2026-31431

CVE-2026-31431

Description

In the Linux kernel, the following vulnerability has been resolved:

crypto: algif_aead - Revert to operating out-of-place

This mostly reverts commit 72548b093ee3 except for the copying of the associated data.

There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Affected products

165
  • cpe:2.3:a:arista:cloudvision_agni:*:*:*:*:*:-:*:*
    Range: >=2024.4.0,<=2025.2.2
  • cpe:2.3:a:arista:cloudvision_portal:*:*:*:*:*:*:*:*
    Range: >=2024.2.0,<=2026.1.0
  • cpe:2.3:a:arista:velocloud_edge:*:*:*:*:*:*:*:*
    Range: >=4.5.0,<=6.4.1
  • cpe:2.3:a:arista:velocloud_gateway:-:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:caas_platform:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:enterprise_storage:6.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:suse:enterprise_storage:6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:suse:enterprise_storage:7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:manager_proxy:4.0:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:suse:manager_proxy:4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:suse:manager_proxy:4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:suse:manager_proxy:4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:manager_retail_branch_server:4.0:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:suse:manager_retail_branch_server:4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:suse:manager_retail_branch_server:4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:suse:manager_retail_branch_server:4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:suse:manager_retail_branch_server:4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:manager_server:4.0:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:suse:manager_server:4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:suse:manager_server:4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:suse:manager_server:4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:openstack_cloud:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:openstack_cloud_crowbar:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:velocloud_orchestrator:-:*:*:*:*:*:*:*
  • cpe:2.3:o:amazon:amazon_linux:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arista:netvisor_os:*:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:arista:netvisor_os:*:*:*:*:*:*:*:*range: <7.1.0
    • cpe:2.3:o:arista:netvisor_os:7.1.0:-:*:*:*:*:*:*
    • cpe:2.3:o:arista:netvisor_os:7.1.0:hotfix7:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
  • Linux/Kernel7 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 6 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=4.14,<5.10.254
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
  • cpe:2.3:o:nixos:nixos:*:*:*:*:*:*:*:*
    Range: <25.11
  • OpenSUSE/Leap4 versions
    cpe:2.3:o:opensuse:leap:15.3:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:o:opensuse:leap:15.3:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:leap:15.4:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:leap:15.5:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux:10.1:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn\/dp_mfp_firmware:*:*:*:*:*:*:*:*
    Range: >=3.1.5
  • cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\/dp_mfp_firmware:*:*:*:*:*:*:*:*
    Range: >=3.1.5
  • cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:*:*:*:*:*:*:*:*
    Range: <1.1
  • cpe:2.3:o:siemens:siplus_s7-1500_cpu_1518-4_pn\/dp_mfp_firmware:*:*:*:*:*:*:*:*
    Range: >=3.1.5
  • cpe:2.3:o:suse:basesystem_module:15:sp1:*:*:*:suse_linux_enterprise:*:*+ 6 more
    • cpe:2.3:o:suse:basesystem_module:15:sp1:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:basesystem_module:15:sp2:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:basesystem_module:15:sp3:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:basesystem_module:15:sp4:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:basesystem_module:15:sp5:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:basesystem_module:15:sp6:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:basesystem_module:15:sp7:*:*:*:suse_linux_enterprise:*:*
  • cpe:2.3:o:suse:development_tools_module:15:sp1:*:*:*:suse_linux_enterprise:*:*+ 6 more
    • cpe:2.3:o:suse:development_tools_module:15:sp1:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:development_tools_module:15:sp2:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:development_tools_module:15:sp3:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:development_tools_module:15:sp4:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:development_tools_module:15:sp5:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:development_tools_module:15:sp6:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:development_tools_module:15:sp7:*:*:*:suse_linux_enterprise:*:*
  • cpe:2.3:o:suse:legacy_module:15:sp7:*:*:*:suse_linux_enterprise:*:*
  • cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*+ 8 more
    • cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:15:sp1:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:15:sp2:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:15:sp3:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:15:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:15:sp5:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp4:*:*:*:*:*:*+ 3 more
    • cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp6:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_availability_extension:15:sp7:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_availability_extension:16.0:-:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:-:*:*:*+ 16 more
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:-:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:espos:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:ltss:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:-:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:espos:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:ltss:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:-:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:espos:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:ltss:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:-:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:espos:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:ltss:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:-:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:espos:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp5:*:*:ltss:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp6:*:*:-:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp7:*:*:-:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp5:*:*:*:*:*:*+ 4 more
    • cpe:2.3:o:suse:linux_enterprise_live_patching:12:sp5:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp5:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp6:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_live_patching:15:sp7:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_micro:5.0:*:*:*:*:-:*:*+ 8 more
    • cpe:2.3:o:suse:linux_enterprise_micro:5.0:*:*:*:*:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_micro:5.1:*:*:*:*:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:rancher:*:*
    • cpe:2.3:o:suse:linux_enterprise_micro:5.3:*:*:*:*:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_micro:5.3:*:*:*:*:rancher:*:*
    • cpe:2.3:o:suse:linux_enterprise_micro:5.4:*:*:*:*:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_micro:5.4:*:*:*:*:rancher:*:*
    • cpe:2.3:o:suse:linux_enterprise_micro:5.5:*:*:*:*:-:*:*
  • cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*+ 5 more
    • cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp3:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp5:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:-:-:*:*+ 36 more
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss_extreme_core:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:espos:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:ltss:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:sap:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss_extended_security:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:business_critical_linux:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:ltss:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:-:sap:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:business_critical_linux:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:ltss:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:-:sap:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:business_critical_linux:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:ltss:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:-:sap:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:ltss:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:-:sap:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:ltss:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:-:sap:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:ltss:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp6:*:*:-:sap:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp7:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:15:sp7:*:*:-:sap:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:16.0:-:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:16.0:-:*:*:-:sap:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:16.1:-:*:*:-:-:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:16.1:-:*:*:-:sap:*:*
  • cpe:2.3:o:suse:linux_enterprise_workstation_extension:15:sp7:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_micro:6.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:suse:linux_micro:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_micro:6.1:*:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_micro:6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:public_cloud_module:15:sp6:*:*:*:suse_linux_enterprise:*:*+ 1 more
    • cpe:2.3:o:suse:public_cloud_module:15:sp6:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:public_cloud_module:15:sp7:*:*:*:suse_linux_enterprise:*:*
  • cpe:2.3:o:suse:realtime_module:15:sp3:*:*:*:suse_linux_enterprise:*:*+ 4 more
    • cpe:2.3:o:suse:realtime_module:15:sp3:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:realtime_module:15:sp4:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:realtime_module:15:sp5:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:realtime_module:15:sp6:*:*:*:suse_linux_enterprise:*:*
    • cpe:2.3:o:suse:realtime_module:15:sp7:*:*:*:suse_linux_enterprise:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

Root cause

"Missing proper handling of associated data copying in `algif_aead` leads to incorrect resource transfer between memory mappings."

Attack vector

An attacker with local access and low privileges can trigger this vulnerability by exploiting the `algif_aead` module's handling of associated data. The bug arises from an incorrect resource transfer between different memory mappings, allowing for unintended control over resources. This can lead to high impact on confidentiality, integrity, and availability. [CWE-669]

Affected code

The vulnerability lies within the `algif_aead` module in the Linux kernel. The complexity introduced for in-place operations in this module is the source of the issue.

What the fix does

The patch reverts the in-place operation complexity in `algif_aead` and instead copies the associated data. This change eliminates the flawed resource transfer mechanism that allowed unintended control, thereby resolving the vulnerability. The complexity added for in-place operations is removed, simplifying the data handling process.

Preconditions

  • authAttacker must have local access.
  • authAttacker must have low privileges.

Reproduction

The public exploit references provide detailed steps and code for reproducing this vulnerability.

Generated by google/gemini-2.5-flash-lite on May 2, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

76

News mentions

15