CVE-2025-68726
Unknown Unknown - Not Provided
Memory Corruption in Linux Kernel AEAD Crypto Due to Reqsize Mishandling

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: crypto: aead - Fix reqsize handling Commit afddce13ce81d ("crypto: api - Add reqsize to crypto_alg") introduced cra_reqsize field in crypto_alg struct to replace type specific reqsize fields. It looks like this was introduced specifically for ahash and acomp from the commit description as subsequent commits add necessary changes in these alg frameworks. However, this is being recommended for use in all crypto algs instead of setting reqsize using crypto_*_set_reqsize(). Using cra_reqsize in aead algorithms, hence, causes memory corruptions and crashes as the underlying functions in the algorithm framework have not been updated to set the reqsize properly from cra_reqsize. [1] Add proper set_reqsize calls in the aead init function to properly initialize reqsize for these algorithms in the framework. [1]: https://gist.github.com/Pratham-T/24247446f1faf4b7843e4014d5089f6b
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-06
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux kernel *
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves improper handling of the 'reqsize' field in the Linux kernel's crypto API, specifically in AEAD (Authenticated Encryption with Associated Data) algorithms. A commit introduced a new 'cra_reqsize' field intended to replace type-specific 'reqsize' fields, but the AEAD algorithms were not updated to properly set 'reqsize' from 'cra_reqsize'. This mismatch causes memory corruption and crashes because the underlying algorithm framework functions do not initialize 'reqsize' correctly.


How can this vulnerability impact me? :

The vulnerability can lead to memory corruption and crashes in the Linux kernel's cryptographic operations involving AEAD algorithms. This can cause system instability, potential denial of service, or unexpected behavior in applications relying on these cryptographic functions.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the crypto: aead reqsize handling issue. This fix properly initializes the reqsize for aead algorithms to prevent memory corruption and crashes.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart