Home

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: skcipher - Fix reqsize handling Commit afddce13ce81d ("crypto: api - Add reqsize to crypto_alg") introduced cra_reqsize field in crypto_alg struct to replace type specific reqsize fields. It looks like this was introduced specifically for ahash and acomp from the commit description as subsequent commits add necessary changes in these alg frameworks. However, this is being recommended for use in all crypto algs [1] instead of setting reqsize using crypto_*_set_reqsize(). Using cra_reqsize in skcipher algorithms, hence, causes memory corruptions and crashes as the underlying functions in the algorithm framework have not been updated to set the reqsize properly from cra_reqsize. [2] Add proper set_reqsize calls in the skcipher init function to properly initialize reqsize for these algorithms in the framework. [1]: https://lore.kernel.org/linux-crypto/aCL8BxpHr5OpT04k@gondor.apana.org.au/ [2]: https://gist.github.com/Pratham-T/24247446f1faf4b7843e4014d5089f6b

PUBLISHED Reserved 2025-04-16 | Published 2025-11-12 | Updated 2025-11-12 | Assigner Linux

Product status

Default status
unaffected

afddce13ce81d52a13898fa0700917835c71acd6 (git) before f041339d6b9a5a46437f0c48fc7279c92af7a513
affected

afddce13ce81d52a13898fa0700917835c71acd6 (git) before 229c586b5e86979badb7cb0d38717b88a9e95ddd
affected

Default status
affected

6.16
affected

Any version before 6.16
unaffected

6.17.4 (semver)
unaffected

6.18-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/f041339d6b9a5a46437f0c48fc7279c92af7a513

git.kernel.org/...c/229c586b5e86979badb7cb0d38717b88a9e95ddd

cve.org (CVE-2025-40182)

nvd.nist.gov (CVE-2025-40182)

Download JSON