Description
In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than the minimum expected length, crypto_authenc_esn_decrypt() can advance past the end of the destination scatterlist and trigger a NULL pointer dereference in scatterwalk_map_and_copy(), leading to a kernel panic (DoS). Add a minimum AAD length check to fail fast on invalid inputs.
References (7)
Scores
CVSS v3
5.5
EPSS
0.0002
EPSS Percentile
4.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-476
Status
published
Products (8)
linux/Kernel
4.3.0 - 5.10.249linux
linux/Kernel
5.11.0 - 5.15.199linux
linux/Kernel
5.16.0 - 6.1.162linux
linux/Kernel
6.13.0 - 6.18.8linux
linux/Kernel
6.2.0 - 6.6.122linux
linux/Kernel
6.7.0 - 6.12.68linux
linux/linux_kernel
6.19 rc1 (6 CPE variants)
linux/linux_kernel
4.3 - 5.10.249
Published
Feb 04, 2026
Tracked Since
Feb 18, 2026