CVE-2026-43077
crypto: algif_aead Decryption RX Size Check Bypass
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's crypto subsystem, specifically in the algif_aead module responsible for authenticated encryption with associated data (AEAD). The issue was that during decryption, the check for the minimum receive buffer size did not account for the tag size, which is an essential part of the encrypted data used for authentication. This could lead to improper handling of the buffer size. The vulnerability was fixed by adding the required extra length to the minimum receive buffer size check.
How can this vulnerability impact me? :
Because the minimum receive buffer size check during decryption did not consider the tag size, it could potentially lead to incorrect processing of encrypted data. This might cause decryption failures or security issues related to data integrity verification. However, specific impacts such as data leakage or system compromise are not detailed in the provided information.