CVE-2026-31677
Received Received - Intake
Buffer Overflow in Linux Kernel af_alg RX Scatterlist Handling

Publication date: 2026-04-25

Last updated on: 2026-04-25

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - limit RX SG extraction by receive buffer budget Make af_alg_get_rsgl() limit each RX scatterlist extraction to the remaining receive buffer budget. af_alg_get_rsgl() currently uses af_alg_readable() only as a gate before extracting data into the RX scatterlist. Limit each extraction to the remaining af_alg_rcvbuf(sk) budget so that receive-side accounting matches the amount of data attached to the request. If skcipher cannot obtain enough RX space for at least one chunk while more data remains to be processed, reject the recvmsg call instead of rounding the request length down to zero.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-25
Last Modified
2026-04-25
Generated
2026-05-07
AI Q&A
2026-04-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's crypto subsystem, specifically in the af_alg module. The issue involves the function af_alg_get_rsgl() which extracts data into the receive (RX) scatterlist without properly limiting the extraction to the available receive buffer budget.

The fix ensures that each RX scatterlist extraction is limited to the remaining receive buffer budget, so the receive-side accounting matches the actual amount of data attached to the request. If there is not enough RX space for at least one chunk of data, the recvmsg call is rejected instead of rounding the request length down to zero.


How can this vulnerability impact me? :

This vulnerability could lead to improper handling of received data buffers in the af_alg crypto interface, potentially causing data processing errors or unexpected behavior when receiving data.

If the receive buffer budget is not properly enforced, it might allow the system to process data incorrectly or cause resource accounting mismatches, which could lead to denial of service or other stability issues in applications relying on this crypto interface.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart