CVE-2026-43043

Published: Mag 01, 2026 Last Modified: Mag 01, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

crypto: af-alg - fix NULL pointer dereference in scatterwalk

The AF_ALG interface fails to unmark the end of a Scatter/Gather List (SGL)
when chaining a new af_alg_tsgl structure. If a sendmsg() fills an SGL
exactly to MAX_SGL_ENTS, the last entry is marked as the end. A subsequent
sendmsg() allocates a new SGL and chains it, but fails to clear the end
marker on the previous SGL's last data entry.

This causes the crypto scatterwalk to hit a premature end, returning NULL
on sg_next() and leading to a kernel panic during dereference.

Fix this by explicitly unmarking the end of the previous SGL when
performing sg_chain() in af_alg_alloc_tsgl().

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0002
Percentile
0,1th
Updated

EPSS Score Trend (Last 2 Days)

https://git.kernel.org/stable/c/00cbdec17c15d024a1c5002c7365df7624a18a75
https://git.kernel.org/stable/c/44eafa39363e8d5dfda6a8c6eb6b45458ed4b948
https://git.kernel.org/stable/c/4b03ab0a587ec57eb7ddb5c115d84a42896f60f7
https://git.kernel.org/stable/c/62397b493e14107ae82d8b80938f293d95425bcb
https://git.kernel.org/stable/c/7195350fb78538c25cd790d703f8f2c73ee0d395
https://git.kernel.org/stable/c/7cdf2c6381b21ab5ccf8116750d5582fcd6c0f49
https://git.kernel.org/stable/c/f48d3dd99199180cf37d6253550c55e86372309a
https://git.kernel.org/stable/c/f9acceae7b004956851fd4268edf9f518a9bce04