IRONSMITHINTEL
HIGHCVSS7.8
|
Actively Exploited
|CISA KEV|CVE-2026-31431|Auth: low — authenticated user|Reboot: required|Manual only

Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability

Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.

Published Apr 22, 2026 · Updated May 16, 2026
Why patchRisk explained in plain English
Worst-case scenarioIf unpatched

A local attacker, with a low-privilege account, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. Federal agencies are required to remediate by 2026-05-15 under CISA BOD 22-01.

How the attack worksNo clicks needed

This is a Software Vulnerability (CWE-669) (CWE-669) vulnerability in Linux Kernel. In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly. Exploitation requires local access, low attack complexity, a low-privilege authenticated account, and no user interaction required.

Am I affected?Quick check

Probably yes if any of these apply:

IT Security
Running linux kernel: 4.14 ≤ v < 5.10.254, 5.11 ≤ v < 5.15.204, 5.16 ≤ v < 6.1.170, 6.2 ≤ v < 6.6.137, 6.7 ≤ v < 6.12.85, 6.13 ≤ v < 6.18.22, 6.19 ≤ v < 6.19.12, 7.0; openshift container platform: 4.0; enterprise linux: 8.0, 9.0, 10.0, 10.1; amazon linux: -; ubuntu linux: -; debian linux: 11.0, 12.0, 13.0; leap: 15.3, 15.4, 15.5, 15.6; caas platform: 4.0; enterprise storage: 6.0, 7.0, 7.1; manager proxy: 4.0, 4.1, 4.2, 4.3; manager retail branch server: 4.0, 4.1, 4.2, 4.3; manager server: 4.0, 4.1, 4.2, 4.3; openstack cloud: 9.0; openstack cloud crowbar: 9.0; basesystem module: 15; development tools module: 15; legacy module: 15; linux enterprise desktop: 11, 12, 15; linux enterprise high availability extension: 15, 16.0; linux enterprise high performance computing: 15.0; linux enterprise live patching: 12, 15; linux enterprise micro: 5.0, 5.1, 5.2, 5.3, 5.4, 5.5; linux enterprise real time: 15.0; linux enterprise server: 11, 12, 15, 16.0, 16.1; linux enterprise workstation extension: 15; linux micro: 6.0, 6.1, 6.2; public cloud module: 15; realtime module: 15; nixos: v < 25.11; cloudvision agni: 2024.4.0 ≤ v ≤ 2025.2.2; cloudvision portal: 2024.2.0 ≤ v ≤ 2026.1.0; velocloud edge: 4.5.0 ≤ v ≤ 6.4.1; velocloud gateway: -; velocloud orchestrator: -; netvisor os: v < 7.1.0, 7.1.0; simatic s7-1500 tm mfp firmware: v < 1.1
Real-world incidentsWhat we've seen

Active exploitation documented in the wild. Threat-research write-up: http://www.openwall.com/lists/oss-security/2026/04/29/23

How to patch

Manual remediation steps

Apply the Vendor Patch

This vulnerability is in the CISA Known Exploited Vulnerabilities catalog — apply the vendor's security update as soon as possible.

CISA required action: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

References

    1
    Vendor advisory: https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/
    1
    NVD entry: https://nvd.nist.gov/vuln/detail/CVE-2026-31431
    1
    CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-31431
PowerShell automationComing soon

No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.