Description
In the Linux kernel, the following vulnerability has been resolved:

crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption

When decrypting data that is not in-place (src != dst), there is
no need to save the high-order sequence bits in dst as it could
simply be re-copied from the source.

However, the data to be hashed need to be rearranged accordingly.


Thanks,
Published: 2026-05-01
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in Linux kernel’s authencesn crypto routine writes high‑order sequence bits to the destination buffer during out‑of‑place decryption, even though those bits could be copied directly from the source. This mis‑behaviour represents a CWE‑237 weakness and causes the data that is subsequently hashed to differ from the actual plaintext, potentially corrupting cryptographic results. The adverse outcome is that authentication or integrity checks that rely on the hash may produce incorrect outcomes, which could be exploited to bypass or undermine security controls.

Affected Systems

The vulnerability resides in the authencesn cryptographic routine of the Linux kernel. Any kernel version that does not yet include the patch that removes the unnecessary write to the destination buffer is potentially exposed. The affected version information is not explicitly listed, so all releases prior to the fix should be considered at risk.

Risk and Exploitability

The CVSS score is 7.8 and the EPSS score is less than 1%, and the flaw is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker would need to supply crafted input to the kernel’s authencesn decryption function in order to influence the hashing operation; such input would likely require kernel‑level access or the ability to control kernel memory. No publicly available exploit has been reported, and the low EPSS suggests a low probability of real‑world exploitation, but the inherent error in cryptographic handling warrants cautious assessment.

Generated by OpenCVE AI on May 3, 2026 at 09:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the authencesn decryption bug fix (commit 153d5520c3f9fd62e71c7e7f9e34b59cf411e555 or newer).
  • If an immediate kernel upgrade is not feasible, disable or avoid the authencesn decryption path by configuring the kernel to eliminate the affected module or by adjusting application use of the routine.
  • Switch to an alternative cryptographic algorithm or implementation that does not rely on the vulnerable authencesn routine, or update applications to use the safer implementation.

Generated by OpenCVE AI on May 3, 2026 at 09:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4560-1 linux security update
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sun, 03 May 2026 06:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Sat, 02 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-237
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption When decrypting data that is not in-place (src != dst), there is no need to save the high-order sequence bits in dst as it could simply be re-copied from the source. However, the data to be hashed need to be rearranged accordingly. Thanks,
Title crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-03T05:46:15.141Z

Reserved: 2026-05-01T14:12:55.977Z

Link: CVE-2026-43033

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:47.910

Modified: 2026-05-03T07:16:23.133

Link: CVE-2026-43033

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-43033 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-03T09:15:06Z

Weaknesses