CVE-2026-43077
Received Received - Intake
crypto: algif_aead Decryption RX Size Check Bypass

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Fix minimum RX size check for decryption The check for the minimum receive buffer size did not take the tag size into account during decryption. Fix this by adding the required extra length.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's crypto subsystem, specifically in the algif_aead module responsible for authenticated encryption with associated data (AEAD). The issue was that during decryption, the check for the minimum receive buffer size did not account for the tag size, which is an essential part of the encrypted data used for authentication. This could lead to improper handling of the buffer size. The vulnerability was fixed by adding the required extra length to the minimum receive buffer size check.


How can this vulnerability impact me? :

Because the minimum receive buffer size check during decryption did not consider the tag size, it could potentially lead to incorrect processing of encrypted data. This might cause decryption failures or security issues related to data integrity verification. However, specific impacts such as data leakage or system compromise are not detailed in the provided information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart