Description
In the Linux kernel, the following vulnerability has been resolved:

crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl

When page reassignment was added to af_alg_pull_tsgl the original
loop wasn't updated so it may try to reassign one more page than
necessary.

Add the check to the reassignment so that this does not happen.

Also update the comment which still refers to the obsolete offset
argument.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the Linux kernel crypto subsystem, specifically within the af_alg_pull_tsgl function. When page reassignment was added, the loop controlling the number of pages to reassign failed to adjust for the new logic, allowing the code to attempt reassignment of one page beyond what was necessary. This can lead to an out‑of‑bounds write or overwrite ring allocation structures, potentially corrupting kernel memory. Such corruption may allow an attacker to execute arbitrary code at the privilege level of the kernel or to crash the system, thereby compromising confidentiality, integrity, and availability.

Affected Systems

Linux kernel releases that include the af_alg interface are impacted. The CNA vendor list shows Linux:Linux, and no specific fixed or affected version ranges are provided, meaning any kernel build that contains af_alg_pull_tsgl without the patch may be vulnerable. Users should verify if their kernel version includes the commit that introduced the fix.

Risk and Exploitability

No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The CVSS score is unspecified in the public data, but the nature of the flaw—kernel out‑of‑bounds write—typically carries high severity. The likely attack vector requires the attacker to execute code that triggers af_alg calls, such as a malicious crypto operation. If an attacker can supply input that forces a page reassignment beyond bounds, memory corruption may occur, potentially leading to arbitrary code execution or denial of service. The absence of an official KEV listing and EPSS data suggests it is not yet widely exploited publicly, but the impact of exploitation remains severe.

Generated by OpenCVE AI on May 6, 2026 at 11:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a Linux kernel version that includes the af_alg_pull_tsgl patch
  • If immediate kernel upgrade is not feasible, apply the specific commit or patch from the official kernel source repository that fixes the page reassignment logic
  • Restrict access to the af_alg cryptographic interface by configuring system policies or firewall rules to limit which users or services can make af_alg calls

Generated by OpenCVE AI on May 6, 2026 at 11:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 11:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-788

Wed, 06 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl When page reassignment was added to af_alg_pull_tsgl the original loop wasn't updated so it may try to reassign one more page than necessary. Add the check to the reassignment so that this does not happen. Also update the comment which still refers to the obsolete offset argument.
Title crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T07:40:15.092Z

Reserved: 2026-05-01T14:12:55.983Z

Link: CVE-2026-43078

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T10:16:20.853

Modified: 2026-05-06T10:16:20.853

Link: CVE-2026-43078

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T11:30:26Z

Weaknesses