Description
In the Linux kernel, the following vulnerability has been resolved: crypto: aead - Fix reqsize handling Commit afddce13ce81d ("crypto: api - Add reqsize to crypto_alg") introduced cra_reqsize field in crypto_alg struct to replace type specific reqsize fields. It looks like this was introduced specifically for ahash and acomp from the commit description as subsequent commits add necessary changes in these alg frameworks. However, this is being recommended for use in all crypto algs instead of setting reqsize using crypto_*_set_reqsize(). Using cra_reqsize in aead algorithms, hence, causes memory corruptions and crashes as the underlying functions in the algorithm framework have not been updated to set the reqsize properly from cra_reqsize. [1] Add proper set_reqsize calls in the aead init function to properly initialize reqsize for these algorithms in the framework. [1]: https://gist.github.com/Pratham-T/24247446f1faf4b7843e4014d5089f6b
Product status
afddce13ce81d52a13898fa0700917835c71acd6 (git) before 64377e66e187164bd6737112d07257f5f0feb681
afddce13ce81d52a13898fa0700917835c71acd6 (git) before 12b413f5460c393d1151a37f591140693eca0f84
afddce13ce81d52a13898fa0700917835c71acd6 (git) before 9b04d8f00569573796dd05397f5779135593eb24
6.16
Any version before 6.16
6.17.13 (semver)
6.18.2 (semver)
6.19-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/64377e66e187164bd6737112d07257f5f0feb681
git.kernel.org/...c/12b413f5460c393d1151a37f591140693eca0f84
git.kernel.org/...c/9b04d8f00569573796dd05397f5779135593eb24
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.