CVE-2026-43043
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
01/05/2026
Last modified:
08/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
crypto: af-alg - fix NULL pointer dereference in scatterwalk<br />
<br />
The AF_ALG interface fails to unmark the end of a Scatter/Gather List (SGL)<br />
when chaining a new af_alg_tsgl structure. If a sendmsg() fills an SGL<br />
exactly to MAX_SGL_ENTS, the last entry is marked as the end. A subsequent<br />
sendmsg() allocates a new SGL and chains it, but fails to clear the end<br />
marker on the previous SGL&#39;s last data entry.<br />
<br />
This causes the crypto scatterwalk to hit a premature end, returning NULL<br />
on sg_next() and leading to a kernel panic during dereference.<br />
<br />
Fix this by explicitly unmarking the end of the previous SGL when<br />
performing sg_chain() in af_alg_alloc_tsgl().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.38 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/00cbdec17c15d024a1c5002c7365df7624a18a75
- https://git.kernel.org/stable/c/44eafa39363e8d5dfda6a8c6eb6b45458ed4b948
- https://git.kernel.org/stable/c/4b03ab0a587ec57eb7ddb5c115d84a42896f60f7
- https://git.kernel.org/stable/c/62397b493e14107ae82d8b80938f293d95425bcb
- https://git.kernel.org/stable/c/7195350fb78538c25cd790d703f8f2c73ee0d395
- https://git.kernel.org/stable/c/7cdf2c6381b21ab5ccf8116750d5582fcd6c0f49
- https://git.kernel.org/stable/c/f48d3dd99199180cf37d6253550c55e86372309a
- https://git.kernel.org/stable/c/f9acceae7b004956851fd4268edf9f518a9bce04



