Description
In the Linux kernel, the following vulnerability has been resolved:

crypto: algif_aead - Revert to operating out-of-place

This mostly reverts commit 72548b093ee3 except for the copying of
the associated data.

There is no benefit in operating in-place in algif_aead since the
source and destination come from different mappings. Get rid of
all the complexity added for in-place operation and just copy the
AD directly.
Published: 2026-04-22
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cryptographic Integrity Failure
Action: Patch
AI Analysis

Impact

The vulnerability was discovered in the Linux kernel’s cryptographic helper function algif_aead, where a change intended to enable in‑place handling of authentication data was later reverted. The in‑place logic could have caused memory overlap between source and destination buffers because they were mapped separately, potentially leading to corrupted authentication tags or incorrect encryption outputs. The revert restores a simple out‑of‑place copy and eliminates that overlap. This weakness corresponds to CWE‑1288, where improper validation of credentials or data integrity can allow attackers to influence authentication results.

Affected Systems

All Linux kernel installations that incorporated the erroneous in‑place implementation of algif_aead may be affected. The specific kernel versions affected are not listed, but any release that contains the in‑place operation before the revert could be vulnerable. Distribution maintainers should verify whether the revert commit is present in their shipped kernel images.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate severity. No EPSS score is available, and the vulnerability is not currently listed in the CISA KEV catalog, so the exploitation likelihood is uncertain. The attack likely requires the ability to send crafted cryptographic requests to the kernel, which could be achieved via local user processes that invoke the affected helper or through a higher‑privileged exploit that writes arbitrary data into the relevant buffers. The potential consequence, if the flaw had persisted, would be the generation or acceptance of incorrect authentication tags, which could lead to data integrity violations or a denial‑of‑service condition.

Generated by OpenCVE AI on April 22, 2026 at 15:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the revert of the in‑place logic for algif_aead.
  • If an immediate update is not feasible, cherry‑pick or apply the upstream patches referenced in the advisory URLs to replace the in‑place implementation with an out‑of‑place copy.
  • Verify that no custom kernel modules or local modifications reintroduce the in-place behavior and that the kernel configuration does not compile the affected helper code in an unintended way.

Generated by OpenCVE AI on April 22, 2026 at 15:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1288
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 22 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.
Title crypto: algif_aead - Revert to operating out-of-place
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-22T08:15:10.123Z

Reserved: 2026-03-09T15:48:24.089Z

Link: CVE-2026-31431

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-22T09:16:21.270

Modified: 2026-04-22T09:16:21.270

Link: CVE-2026-31431

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-22T00:00:00Z

Links: CVE-2026-31431 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T15:15:16Z

Weaknesses