Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: crypto: af-alg - fix NULL pointer dereference in scatterwalk The AF_ALG interface fails to unmark the end of a Scatter/Gather List (SGL) when chaining a new af_alg_tsgl structure. If a sendmsg() fills an SGL exactly to MAX_SGL_ENTS, the last entry is marked as the end. A subsequent sendmsg() allocates a new SGL and chains it, but fails to clear the end marker on the previous SGL's last data entry. This causes the crypto scatterwalk to hit a premature end, returning NULL on sg_next() and leading to a kernel panic during dereference. Fix this by explicitly unmarking the end of the previous SGL when performing sg_chain() in af_alg_alloc_tsgl().
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.38, < 5.10.253 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/00cbdec17c15d024a1c5002c7365df7624a18a75Patch
- https://git.kernel.org/stable/c/44eafa39363e8d5dfda6a8c6eb6b45458ed4b948Patch
- https://git.kernel.org/stable/c/4b03ab0a587ec57eb7ddb5c115d84a42896f60f7Patch
- https://git.kernel.org/stable/c/62397b493e14107ae82d8b80938f293d95425bcbPatch
- https://git.kernel.org/stable/c/7195350fb78538c25cd790d703f8f2c73ee0d395Patch
- https://git.kernel.org/stable/c/7cdf2c6381b21ab5ccf8116750d5582fcd6c0f49Patch
- https://git.kernel.org/stable/c/f48d3dd99199180cf37d6253550c55e86372309aPatch
- https://git.kernel.org/stable/c/f9acceae7b004956851fd4268edf9f518a9bce04Patch
FAQ
What is CVE-2026-43043?
CVE-2026-43043 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: crypto: af-alg - fix NULL pointer dereference in scatterwalk The AF_ALG interface fails to unmark the end of a Scatter/Gather List...
How severe is CVE-2026-43043?
CVE-2026-43043 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43043?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.