In the Linux kernel, the following vulnerability has been resolved:
crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec
authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than
the minimum expected length, crypto_authenc_esn_decrypt() can advance past
the end of the destination scatterlist and trigger a NULL pointer dereference
in scatterwalk_map_and_copy(), leading to a kernel panic (DoS).
Add a minimum AAD length check to fail fast on invalid inputs.
References
Configurations
Configuration 1 (hide)
|
History
13 Mar 2026, 21:28
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-476 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/161bdc90fce25bd9890adc67fa1c8563a7acbf40 - Patch | |
| References | () https://git.kernel.org/stable/c/2397e9264676be7794f8f7f1e9763d90bd3c7335 - Patch | |
| References | () https://git.kernel.org/stable/c/767e8349f7e929b7dd95c08f0b4cb353459b365e - Patch | |
| References | () https://git.kernel.org/stable/c/9532ff0d0e90ff78a214299f594ab9bac81defe4 - Patch | |
| References | () https://git.kernel.org/stable/c/b0a9609283a5c852addb513dafa655c61eebc1ef - Patch | |
| References | () https://git.kernel.org/stable/c/df22c9a65e9a9daa368a72fed596af9d7d5876bb - Patch | |
| References | () https://git.kernel.org/stable/c/fee86edf5803f1d1f19e3b4f2dacac241bddfa48 - Patch | |
| Summary |
|
06 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-04 17:16
Updated : 2026-03-13 21:28
NVD link : CVE-2026-23060
Mitre link : CVE-2026-23060
CVE.ORG link : CVE-2026-23060
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
