Linux Out-Of-Bounds Access Fixed For Unprivileged Users With Specially Crafted Certs

Linux Out-Of-Bounds Access Fixed For Unprivileged Users With Specially Crafted Certs

Phoronix
PhoronixApr 12, 2026

Key Takeaways

  • OOB bug existed in kernel X.509 parsing since Linux 6.4 (2023).
  • Unprivileged users could trigger crash via crafted certificate through keyrings API.
  • Patch adds length check before reading extension byte, preventing OOB read.
  • Fix will be in Linux 7.0 and back‑ported to all supported LTS kernels.

Pulse Analysis

Kernel security remains a top priority for the open‑source ecosystem, and out‑of‑bounds (OOB) reads are among the most insidious flaws. The Linux kernel’s X.509 certificate handling code is invoked whenever the system validates digital signatures, a routine operation for secure boot, module loading, and network authentication. An OOB read bypasses normal memory safety checks, allowing malformed data to corrupt kernel memory. Historically, such bugs have led to high‑impact exploits, prompting rapid response from maintainers and the broader community.

The newly disclosed issue stems from a missing length verification when parsing empty Basic Constraints or Key Usage extensions. By crafting a certificate with a zero‑length extension, an attacker can force the kernel to read the first byte before confirming the buffer size, triggering an OOB access. Although the immediate impact is limited to a potential kernel panic or denial‑of‑service, the underlying mechanism could be leveraged for privilege escalation or arbitrary code execution on vulnerable systems. Because the exploit works through the keyrings(7) API, any unprivileged user—such as a sandboxed process or a compromised web service—could launch the attack without needing elevated rights.

The remediation, merged just before the Linux 7.0 release, introduces a defensive check that validates extension length prior to any byte‑wise read. By back‑porting the patch to all active LTS branches (6.6, 6.12, 6.18, 6.19), distribution vendors can roll out updates across a wide install base, minimizing exposure. This proactive approach underscores the kernel’s rapid patch cadence and the importance of coordinated disclosure. Enterprises running Linux workloads should prioritize applying the updated kernels to safeguard against unexpected crashes and maintain compliance with security best practices.

Linux Out-Of-Bounds Access Fixed For Unprivileged Users With Specially Crafted Certs

Comments

Want to join the conversation?