CVE-2025-71113
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/01/2026
Last modified:
25/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
crypto: af_alg - zero initialize memory allocated via sock_kmalloc<br />
<br />
Several crypto user API contexts and requests allocated with<br />
sock_kmalloc() were left uninitialized, relying on callers to<br />
set fields explicitly. This resulted in the use of uninitialized<br />
data in certain error paths or when new fields are added in the<br />
future.<br />
<br />
The ACVP patches also contain two user-space interface files:<br />
algif_kpp.c and algif_akcipher.c. These too rely on proper<br />
initialization of their context structures.<br />
<br />
A particular issue has been observed with the newly added<br />
&#39;inflight&#39; variable introduced in af_alg_ctx by commit:<br />
<br />
67b164a871af ("crypto: af_alg - Disallow multiple in-flight AIO requests")<br />
<br />
Because the context is not memset to zero after allocation,<br />
the inflight variable has contained garbage values. As a result,<br />
af_alg_alloc_areq() has incorrectly returned -EBUSY randomly when<br />
the garbage value was interpreted as true:<br />
<br />
https://github.com/gregkh/linux/blame/master/crypto/af_alg.c#L1209<br />
<br />
The check directly tests ctx->inflight without explicitly<br />
comparing against true/false. Since inflight is only ever set to<br />
true or false later, an uninitialized value has triggered<br />
-EBUSY failures. Zero-initializing memory allocated with<br />
sock_kmalloc() ensures inflight and other fields start in a known<br />
state, removing random issues caused by uninitialized data.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.38.1 (including) | 5.10.248 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.198 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.160 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/51a5ab36084f3251ef87eda3e6a6236f6488925e
- https://git.kernel.org/stable/c/543bf004e4eafbb302b1e6c78570d425d2ca13a0
- https://git.kernel.org/stable/c/5a4b65523608974a81edbe386f8a667a3e10c726
- https://git.kernel.org/stable/c/6f6e309328d53a10c0fe1f77dec2db73373179b6
- https://git.kernel.org/stable/c/84238876e3b3b262cf62d5f4d1338e983fb27010
- https://git.kernel.org/stable/c/e125c8e346e4eb7b3e854c862fcb4392bc13ddba
- https://git.kernel.org/stable/c/f81244fd6b14fecfa93b66b6bb1d59f96554e550



