Home

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: af-alg - fix NULL pointer dereference in scatterwalk The AF_ALG interface fails to unmark the end of a Scatter/Gather List (SGL) when chaining a new af_alg_tsgl structure. If a sendmsg() fills an SGL exactly to MAX_SGL_ENTS, the last entry is marked as the end. A subsequent sendmsg() allocates a new SGL and chains it, but fails to clear the end marker on the previous SGL's last data entry. This causes the crypto scatterwalk to hit a premature end, returning NULL on sg_next() and leading to a kernel panic during dereference. Fix this by explicitly unmarking the end of the previous SGL when performing sg_chain() in af_alg_alloc_tsgl().

PUBLISHED Reserved 2026-05-01 | Published 2026-05-01 | Updated 2026-05-01 | Assigner Linux

Product status

Default status
unaffected

8ff590903d5fc7f5a0a988c38267a3d08e6393a2 (git) before f48d3dd99199180cf37d6253550c55e86372309a
affected

8ff590903d5fc7f5a0a988c38267a3d08e6393a2 (git) before f9acceae7b004956851fd4268edf9f518a9bce04
affected

8ff590903d5fc7f5a0a988c38267a3d08e6393a2 (git) before 7195350fb78538c25cd790d703f8f2c73ee0d395
affected

8ff590903d5fc7f5a0a988c38267a3d08e6393a2 (git) before 7cdf2c6381b21ab5ccf8116750d5582fcd6c0f49
affected

8ff590903d5fc7f5a0a988c38267a3d08e6393a2 (git) before 44eafa39363e8d5dfda6a8c6eb6b45458ed4b948
affected

8ff590903d5fc7f5a0a988c38267a3d08e6393a2 (git) before 00cbdec17c15d024a1c5002c7365df7624a18a75
affected

8ff590903d5fc7f5a0a988c38267a3d08e6393a2 (git) before 4b03ab0a587ec57eb7ddb5c115d84a42896f60f7
affected

8ff590903d5fc7f5a0a988c38267a3d08e6393a2 (git) before 62397b493e14107ae82d8b80938f293d95425bcb
affected

Default status
affected

2.6.38
affected

Any version before 2.6.38
unaffected

5.10.253 (semver)
unaffected

5.15.203 (semver)
unaffected

6.1.168 (semver)
unaffected

6.6.134 (semver)
unaffected

6.12.81 (semver)
unaffected

6.18.22 (semver)
unaffected

6.19.12 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/f48d3dd99199180cf37d6253550c55e86372309a

git.kernel.org/...c/f9acceae7b004956851fd4268edf9f518a9bce04

git.kernel.org/...c/7195350fb78538c25cd790d703f8f2c73ee0d395

git.kernel.org/...c/7cdf2c6381b21ab5ccf8116750d5582fcd6c0f49

git.kernel.org/...c/44eafa39363e8d5dfda6a8c6eb6b45458ed4b948

git.kernel.org/...c/00cbdec17c15d024a1c5002c7365df7624a18a75

git.kernel.org/...c/4b03ab0a587ec57eb7ddb5c115d84a42896f60f7

git.kernel.org/...c/62397b493e14107ae82d8b80938f293d95425bcb

cve.org (CVE-2026-43043)

nvd.nist.gov (CVE-2026-43043)

Download JSON