Impact
The Linux kernel vulnerability involved the cryptographic helper function algif_aead. An attempt to support in‑place handling of authentication data was later reverted because operating in‑place offered no benefit when the source and destination buffers are mapped separately. The original change added unnecessary complexity that could lead to incorrect handling of authentication data. By restoring a straightforward out‑of‑place copy of the authentication data, the flawed logic is removed, preventing potential data integrity issues caused by malformed authentication tags.
Affected Systems
All Linux kernel installations that include the in‑place implementation of algif_aead before the revert are at risk. The CVE does not list specific kernel versions; thus, any distribution shipping a kernel containing the in‑place logic may be affected. Users and maintainers should verify whether the revert commit is present in their current kernel image.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity, while the EPSS score of 3% and the listing in the CISA KEV catalog indicate that the vulnerability is actively exploited. The description provides no direct exploitation scenario, but given that the flaw resides in a kernel cryptographic helper, the likely attack vector would involve local processes that invoke the helper with crafted inputs, potentially requiring elevated privileges to influence kernel memory. Overall, the risk is significant but the probability of an active exploit remains low.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN