CVE-2026-43330 PUBLISHED

crypto: caam - fix overflow on long hmac keys

Assigner: Linux
Reserved: 01.05.2026 Published: 08.05.2026 Updated: 08.05.2026

In the Linux kernel, the following vulnerability has been resolved:

crypto: caam - fix overflow on long hmac keys

When a key longer than block size is supplied, it is copied and then hashed into the real key. The memory allocated for the copy needs to be rounded to DMA cache alignment, as otherwise the hashed key may corrupt neighbouring memory.

The copying is performed using kmemdup, however this leads to an overflow: reading more bytes (aligned_len - keylen) from the keylen source buffer. Fix this by replacing kmemdup with kmalloc, followed by memcpy.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 199354d7fb6eaa2cc5bb650af0bca624baffee35 to 31022cfde5235c45fa765f0aabeff5f0652852f2 (excl.)
  • affected from 199354d7fb6eaa2cc5bb650af0bca624baffee35 to c2fb4984fe09fc176fe4c12d5e3edf626df6511d (excl.)
  • affected from 199354d7fb6eaa2cc5bb650af0bca624baffee35 to aa545df011338df13f0833fc1fabcb15c0521959 (excl.)
  • affected from 199354d7fb6eaa2cc5bb650af0bca624baffee35 to cebc5ebd958346195b77f42d0cd5141b4e448fae (excl.)
  • affected from 199354d7fb6eaa2cc5bb650af0bca624baffee35 to 80688afb9c35b3934ce2d6be9973758915e2e0ef (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.3 is affected
  • unaffected from 0 to 6.3 (excl.)
  • unaffected from 6.6.134 to 6.6.* (incl.)
  • unaffected from 6.12.81 to 6.12.* (incl.)
  • unaffected from 6.18.22 to 6.18.* (incl.)
  • unaffected from 6.19.12 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References