CVE-2025-68726
Memory Corruption in Linux Kernel AEAD Crypto Due to Reqsize Mishandling
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper handling of the 'reqsize' field in the Linux kernel's crypto API, specifically in AEAD (Authenticated Encryption with Associated Data) algorithms. A commit introduced a new 'cra_reqsize' field intended to replace type-specific 'reqsize' fields, but the AEAD algorithms were not updated to properly set 'reqsize' from 'cra_reqsize'. This mismatch causes memory corruption and crashes because the underlying algorithm framework functions do not initialize 'reqsize' correctly.
How can this vulnerability impact me? :
The vulnerability can lead to memory corruption and crashes in the Linux kernel's cryptographic operations involving AEAD algorithms. This can cause system instability, potential denial of service, or unexpected behavior in applications relying on these cryptographic functions.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the crypto: aead reqsize handling issue. This fix properly initializes the reqsize for aead algorithms to prevent memory corruption and crashes.