CVE-2026-43044
Awaiting Analysis Awaiting Analysis - Queue
crypto: caam DMA corruption fix for long HMAC keys

Publication date: 2026-05-01

Last updated on: 2026-05-03

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: crypto: caam - fix DMA corruption on long hmac keys When a key longer than block size is supplied, it is copied and then hashed into the real key. The memory allocated for the copy needs to be rounded to DMA cache alignment, as otherwise the hashed key may corrupt neighbouring memory. The rounding was performed, but never actually used for the allocation. Fix this by replacing kmemdup with kmalloc for a larger buffer, followed by memcpy.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-01
Last Modified
2026-05-03
Generated
2026-05-07
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's crypto subsystem, specifically in the caam driver handling HMAC keys. When a key longer than the block size is used, it is copied and then hashed into the actual key. However, the memory allocated for this copy was not properly aligned to the DMA cache, which could cause the hashed key to corrupt adjacent memory.

The issue was that although the memory size was rounded for DMA cache alignment, this rounding was not applied during the actual memory allocation. The fix involved replacing the kmemdup function with kmalloc to allocate a larger, properly aligned buffer, followed by copying the key with memcpy.


How can this vulnerability impact me? :

This vulnerability can lead to memory corruption when processing long HMAC keys in the Linux kernel's crypto module. Such memory corruption could potentially cause system instability, crashes, or unpredictable behavior.

In some cases, memory corruption vulnerabilities can be exploited to escalate privileges or execute arbitrary code, but the provided information does not specify if this is possible here.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed in the Linux kernel by correcting the memory allocation for long HMAC keys in the crypto caam module.

To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart