Unrated severityNVD Advisory· Published Feb 4, 2026· Updated Feb 9, 2026
crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec
CVE-2026-23060
Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec
authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than the minimum expected length, crypto_authenc_esn_decrypt() can advance past the end of the destination scatterlist and trigger a NULL pointer dereference in scatterwalk_map_and_copy(), leading to a kernel panic (DoS).
Add a minimum AAD length check to fail fast on invalid inputs.
Affected products
2- Linux/Linuxv5Range: 4.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/161bdc90fce25bd9890adc67fa1c8563a7acbf40mitre
- git.kernel.org/stable/c/2397e9264676be7794f8f7f1e9763d90bd3c7335mitre
- git.kernel.org/stable/c/767e8349f7e929b7dd95c08f0b4cb353459b365emitre
- git.kernel.org/stable/c/9532ff0d0e90ff78a214299f594ab9bac81defe4mitre
- git.kernel.org/stable/c/b0a9609283a5c852addb513dafa655c61eebc1efmitre
- git.kernel.org/stable/c/df22c9a65e9a9daa368a72fed596af9d7d5876bbmitre
- git.kernel.org/stable/c/fee86edf5803f1d1f19e3b4f2dacac241bddfa48mitre
News mentions
0No linked articles in our index yet.