CVE-2026-31430
mediumCVSS v3 Base Score
6.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
EPSS Score
0.0%
Exploitation probability in 30 days
Top 98% most likely to be exploited
Attack Characteristics
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Confidentiality
High
Integrity
Low
Availability
Low
Published: April 20, 2026 (24 days ago)
Last Modified: April 20, 2026
Vendor: Red Hat
Source: REDHAT
Vulnerability Report
Generated by CyberWatcher
Description
A flaw was found in the Linux kernel. An unprivileged user can exploit this vulnerability by submitting a specially crafted X.509 certificate to the kernel through the keyrings(7) application programming interface (API). This certificate, specifically when containing empty Basic Constraints or Key Usage extensions, can trigger an out-of-bounds access during parsing. An out-of-bounds access is a memory corruption issue where a program attempts to read or write data beyond the allocated memory region, which can lead to system instability or a denial of service.
CWE
CWE-125Affected Products
Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9