Description
In the Linux kernel, the following vulnerability has been resolved:

lib/crypto: chacha: Zeroize permuted_state before it leaves scope

Since the ChaCha permutation is invertible, the local variable
'permuted_state' is sufficient to compute the original 'state', and thus
the key, even after the permutation has been done.

While the kernel is quite inconsistent about zeroizing secrets on the
stack (and some prominent userspace crypto libraries don't bother at all
since it's not guaranteed to work anyway), the kernel does try to do it
as a best practice, especially in cases involving the RNG.

Thus, explicitly zeroize 'permuted_state' before it goes out of scope.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An in‑kernel ChaCha implementation stored a temporary variable, permuted_state, on the stack, and failed to overwrite it before it went out of scope. Because the ChaCha permutation is reversible, an attacker who can read the kernel stack can recover the original state and thus the encryption key. The resulting key disclosure compromises all cryptographic operations that rely on ChaCha, including random number generation and authenticated encryption. This flaw represents a classic secret memory disclosure (linked to CWE‑319).

Affected Systems

All Linux kernel versions that include the vulnerable ChaCha implementation, until the security patch is applied. The vulnerability is present in the kernel’s crypto subsystem across all distributions that ship an unpatched kernel.

Risk and Exploitability

The flaw carries a high confidentiality impact: an attacker with the ability to inspect kernel memory, such as one with local privilege escalation or a kernel‑level payload, could recover encryption keys. No public exploit is known, and EPSS data is not available, so the exact likelihood of exploitation is unclear. However, given that the vulnerability exposes critical cryptographic material, the risk is considered high. The vulnerability is not currently listed in the CISA KEV catalog, but it should be treated as a serious flaw due to its direct key‑compromise potential.

Generated by OpenCVE AI on May 8, 2026 at 18:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to the latest version that incorporates the zero‑out of permuted_state in the ChaCha code path. This patch is distributed as part of the kernel’s regular release cycle.
  • Re‑boot the system after upgrading the kernel to ensure the new kernel image is in use and that the patch is active.
  • Optionally, audit kernel logs and configuration for signs of known key‑exposure exploits, and ensure that no unpatched kernel modules remain active, as they could potentially re‑introduce the same vulnerability.

Generated by OpenCVE AI on May 8, 2026 at 18:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-319

Fri, 08 May 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: lib/crypto: chacha: Zeroize permuted_state before it leaves scope Since the ChaCha permutation is invertible, the local variable 'permuted_state' is sufficient to compute the original 'state', and thus the key, even after the permutation has been done. While the kernel is quite inconsistent about zeroizing secrets on the stack (and some prominent userspace crypto libraries don't bother at all since it's not guaranteed to work anyway), the kernel does try to do it as a best practice, especially in cases involving the RNG. Thus, explicitly zeroize 'permuted_state' before it goes out of scope.
Title lib/crypto: chacha: Zeroize permuted_state before it leaves scope
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:31:22.280Z

Reserved: 2026-05-01T14:12:56.002Z

Link: CVE-2026-43336

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:43.383

Modified: 2026-05-08T14:16:43.383

Link: CVE-2026-43336

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T23:45:20Z

Weaknesses