crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec
authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than
the minimum expected length, crypto_authenc_esn_decrypt() can advance past
the end of the destination scatterlist and trigger a NULL pointer dereference
in scatterwalk_map_and_copy(), leading to a kernel panic (DoS).
Add a minimum AAD length check to fail fast on invalid inputs.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4475-1 | linux security update |
Debian DLA |
DLA-4476-1 | linux-6.1 security update |
Debian DSA |
DSA-6126-1 | linux security update |
Debian DSA |
DSA-6127-1 | linux security update |
Ubuntu USN |
USN-8143-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-8145-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-8148-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-8149-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-8143-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-8145-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-8148-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-8148-3 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-8145-3 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-8148-4 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-8152-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-8148-5 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-8149-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-8159-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-8159-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-8159-3 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-8162-1 | Linux kernel (NVIDIA Tegra) vulnerabilities |
Ubuntu USN |
USN-8163-1 | Linux kernel (Azure FIPS) vulnerabilities |
Ubuntu USN |
USN-8164-1 | Linux kernel (Intel IoTG Real-time) vulnerabilities |
Ubuntu USN |
USN-8165-1 | Linux kernel (Azure FIPS) vulnerabilities |
Ubuntu USN |
USN-8145-4 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-8148-6 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-8163-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-8145-5 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-8148-7 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-8188-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-8200-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-8200-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-8201-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-8203-1 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-8224-1 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-8243-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-8261-1 | Linux kernel (Xilinx) vulnerabilities |
Ubuntu USN |
USN-8200-3 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-8267-1 | Linux kernel vulnerabilities |
Fri, 13 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-476 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 06 Feb 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 05 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 04 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than the minimum expected length, crypto_authenc_esn_decrypt() can advance past the end of the destination scatterlist and trigger a NULL pointer dereference in scatterwalk_map_and_copy(), leading to a kernel panic (DoS). Add a minimum AAD length check to fail fast on invalid inputs. | |
| Title | crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec | |
| First Time appeared |
Linux
Linux linux Kernel |
|
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linux
Linux linux Kernel |
|
| References |
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2026-05-11T21:59:13.583Z
Reserved: 2026-01-13T15:37:45.952Z
Link: CVE-2026-23060
No data.
Status : Analyzed
Published: 2026-02-04T17:16:16.687
Modified: 2026-03-13T21:28:47.830
Link: CVE-2026-23060
OpenCVE Enrichment
Updated: 2026-04-17T23:45:25Z
Debian DLA
Debian DSA
Ubuntu USN