Description
In the Linux kernel, the following vulnerability has been resolved:

crypto: caam - fix overflow on long hmac keys

When a key longer than block size is supplied, it is copied and then
hashed into the real key. The memory allocated for the copy needs to
be rounded to DMA cache alignment, as otherwise the hashed key may
corrupt neighbouring memory.

The copying is performed using kmemdup, however this leads to an overflow:
reading more bytes (aligned_len - keylen) from the keylen source buffer.
Fix this by replacing kmemdup with kmalloc, followed by memcpy.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer overflow occurs in the Linux kernel's caam crypto module when an HMAC key larger than the block size is supplied. The key is duplicated with kmemdup, which incorrectly reads additional bytes from the source buffer, allowing the resulting copy to overwrite adjacent memory. This memory corruption can compromise data integrity and potentially grant an attacker the ability to execute arbitrary code in kernel space, leading to full system compromise, or cause a denial of service by crashing the kernel.

Affected Systems

All Linux kernel implementations that include the caam cryptographic accelerator and use HMAC keys longer than the acceptable block size are affected. No specific kernel versions are listed in the data, so the vulnerability may be present across multiple releases where caam is enabled.

Risk and Exploitability

The CVSS score is not provided, but the described overflow can lead to arbitrary code execution, which is considered a severe impact. Without an EPSS score or KEV listing, the current exploit probability is unknown; however, kernel memory corruption bugs historically are prized by attackers. The most likely attack vector is a local or privileged user who can supply an oversized HMAC key through an application that uses the caam module. Detection would require evidence of neighboring memory corruption or abnormal kernel behavior.

Generated by OpenCVE AI on May 8, 2026 at 18:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel patch that replaces kmemdup with kmalloc and memcpy, as shown in the cited git commits.
  • Verify that the system uses the caam crypto module; if possible, disable or restrict it until the patch is applied.
  • Ensure that all HMAC keys used with the caam module are no longer than the supported block size to avoid triggering the overflow until the patch is in place.

Generated by OpenCVE AI on May 8, 2026 at 18:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Fri, 08 May 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: crypto: caam - fix overflow on long hmac keys When a key longer than block size is supplied, it is copied and then hashed into the real key. The memory allocated for the copy needs to be rounded to DMA cache alignment, as otherwise the hashed key may corrupt neighbouring memory. The copying is performed using kmemdup, however this leads to an overflow: reading more bytes (aligned_len - keylen) from the keylen source buffer. Fix this by replacing kmemdup with kmalloc, followed by memcpy.
Title crypto: caam - fix overflow on long hmac keys
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:31:18.133Z

Reserved: 2026-05-01T14:12:56.002Z

Link: CVE-2026-43330

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:42.650

Modified: 2026-05-08T14:16:42.650

Link: CVE-2026-43330

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T22:30:18Z

Weaknesses