Description
In the Linux kernel, the following vulnerability has been resolved:

crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly

The existing allocation of scatterlists in omap_crypto_copy_sg_lists()
was allocating an array of scatterlist pointers, not scatterlist objects,
resulting in a 4x too small allocation.

Use sizeof(*new_sg) to get the correct object size.
Published: 2026-02-18
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Memory Corruption
Action: Update Kernel
AI Analysis

Impact

The vulnerability resides in the Linux kernel’s OMAP cryptographic driver, where an incorrect allocation size for scatterlists can lead to memory corruption. The existing allocation of scatterlists in omap_crypto_copy_sg_lists() was allocating an array of scatterlist pointers, not scatterlist objects, resulting in a 4x too small allocation. Use of an incorrect allocation size results in out‑of‑bounds writes when the driver populates the scatterlist array, potentially overwriting arbitrary kernel memory and enabling arbitrary code execution within kernel mode.

Affected Systems

Linux kernel encryption drivers employing the OMAP_CRYPTO_FORCE_COPY feature are affected. All kernel versions that include the buggy omap_crypto_copy_sg_lists() implementation are vulnerable; the patch is present in kernel releases newer than the commit referenced in the advisory. Specific vendor or product versions are not enumerated beyond the Linux kernel as a whole.

Risk and Exploitability

The CVSS score of 7.8 denotes a high severity. EPSS less than 1% indicates that the likelihood of exploitation is very low at the time of this analysis, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is a local privilege escalation or an attacker with sufficient access to the OMAP crypto device, since the flaw is triggered during driver operations. Exploitation would require influence over driver input to trigger the out‑of‑bounds write and is thus not trivially exploitable by remote actors.

Generated by OpenCVE AI on April 15, 2026 at 18:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a kernel version that includes the patch correcting the scatterlist allocation; reference the commit logs linked in the advisory.
  • If using a custom kernel module that relies on the OMAP cryptographic driver, rebuild the module against the patched kernel headers to ensure compatibility.
  • As a temporary measure, prevent untrusted code from accessing the OMAP cryptographic device by revoking appropriate permissions (e.g., setting device permissions to root‑only or configuring SELinux/AppArmor profiles) or disable the OMAP crypto driver if it is not required.

Generated by OpenCVE AI on April 15, 2026 at 18:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4498-1 linux security update
Debian DLA Debian DLA DLA-4499-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6141-1 linux security update
Debian DSA Debian DSA DSA-6163-1 linux security update
History

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 18 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Mon, 23 Feb 2026 03:30:00 +0000


Thu, 19 Feb 2026 16:15:00 +0000


Thu, 19 Feb 2026 00:15:00 +0000


Wed, 18 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly The existing allocation of scatterlists in omap_crypto_copy_sg_lists() was allocating an array of scatterlist pointers, not scatterlist objects, resulting in a 4x too small allocation. Use sizeof(*new_sg) to get the correct object size.
Title crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:02:37.510Z

Reserved: 2026-01-13T15:37:45.987Z

Link: CVE-2026-23222

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2026-02-18T16:22:31.920

Modified: 2026-04-02T15:16:23.297

Link: CVE-2026-23222

cve-icon Redhat

Severity :

Publid Date: 2026-02-18T00:00:00Z

Links: CVE-2026-23222 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:15:10Z

Weaknesses