CVE-2025-68726
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
29/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
crypto: aead - Fix reqsize handling<br />
<br />
Commit afddce13ce81d ("crypto: api - Add reqsize to crypto_alg")<br />
introduced cra_reqsize field in crypto_alg struct to replace type<br />
specific reqsize fields. It looks like this was introduced specifically<br />
for ahash and acomp from the commit description as subsequent commits<br />
add necessary changes in these alg frameworks.<br />
<br />
However, this is being recommended for use in all crypto algs<br />
instead of setting reqsize using crypto_*_set_reqsize(). Using<br />
cra_reqsize in aead algorithms, hence, causes memory corruptions and<br />
crashes as the underlying functions in the algorithm framework have not<br />
been updated to set the reqsize properly from cra_reqsize. [1]<br />
<br />
Add proper set_reqsize calls in the aead init function to properly<br />
initialize reqsize for these algorithms in the framework.<br />
<br />
[1]: https://gist.github.com/Pratham-T/24247446f1faf4b7843e4014d5089f6b



