{"api_version":"1","generated_at":"2026-05-11T11:02:57+00:00","cve":"CVE-2026-43330","urls":{"html":"https://cve.report/CVE-2026-43330","api":"https://cve.report/api/cve/CVE-2026-43330.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43330","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43330"},"summary":{"title":"crypto: caam - fix overflow on long hmac keys","description":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: caam - fix overflow on long hmac keys\n\nWhen a key longer than block size is supplied, it is copied and then\nhashed into the real key.  The memory allocated for the copy needs to\nbe rounded to DMA cache alignment, as otherwise the hashed key may\ncorrupt neighbouring memory.\n\nThe copying is performed using kmemdup, however this leads to an overflow:\nreading more bytes (aligned_len - keylen) from the keylen source buffer.\nFix this by replacing kmemdup with kmalloc, followed by memcpy.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-08 14:16:42","updated_at":"2026-05-11 08:16:09"},"problem_types":[],"metrics":[{"version":"3.1","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","type":"Secondary","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://git.kernel.org/stable/c/c2fb4984fe09fc176fe4c12d5e3edf626df6511d","name":"https://git.kernel.org/stable/c/c2fb4984fe09fc176fe4c12d5e3edf626df6511d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/aa545df011338df13f0833fc1fabcb15c0521959","name":"https://git.kernel.org/stable/c/aa545df011338df13f0833fc1fabcb15c0521959","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/80688afb9c35b3934ce2d6be9973758915e2e0ef","name":"https://git.kernel.org/stable/c/80688afb9c35b3934ce2d6be9973758915e2e0ef","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/31022cfde5235c45fa765f0aabeff5f0652852f2","name":"https://git.kernel.org/stable/c/31022cfde5235c45fa765f0aabeff5f0652852f2","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/cebc5ebd958346195b77f42d0cd5141b4e448fae","name":"https://git.kernel.org/stable/c/cebc5ebd958346195b77f42d0cd5141b4e448fae","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43330","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43330","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 199354d7fb6eaa2cc5bb650af0bca624baffee35 31022cfde5235c45fa765f0aabeff5f0652852f2 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 199354d7fb6eaa2cc5bb650af0bca624baffee35 c2fb4984fe09fc176fe4c12d5e3edf626df6511d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 199354d7fb6eaa2cc5bb650af0bca624baffee35 aa545df011338df13f0833fc1fabcb15c0521959 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 199354d7fb6eaa2cc5bb650af0bca624baffee35 cebc5ebd958346195b77f42d0cd5141b4e448fae git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 199354d7fb6eaa2cc5bb650af0bca624baffee35 80688afb9c35b3934ce2d6be9973758915e2e0ef git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.3","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.3 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.134 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.81 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.22 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.12 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"43330","cve":"CVE-2026-43330","epss":"0.000180000","percentile":"0.049330000","score_date":"2026-05-10","updated_at":"2026-05-11 00:14:41"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/crypto/caam/caamalg_qi2.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"31022cfde5235c45fa765f0aabeff5f0652852f2","status":"affected","version":"199354d7fb6eaa2cc5bb650af0bca624baffee35","versionType":"git"},{"lessThan":"c2fb4984fe09fc176fe4c12d5e3edf626df6511d","status":"affected","version":"199354d7fb6eaa2cc5bb650af0bca624baffee35","versionType":"git"},{"lessThan":"aa545df011338df13f0833fc1fabcb15c0521959","status":"affected","version":"199354d7fb6eaa2cc5bb650af0bca624baffee35","versionType":"git"},{"lessThan":"cebc5ebd958346195b77f42d0cd5141b4e448fae","status":"affected","version":"199354d7fb6eaa2cc5bb650af0bca624baffee35","versionType":"git"},{"lessThan":"80688afb9c35b3934ce2d6be9973758915e2e0ef","status":"affected","version":"199354d7fb6eaa2cc5bb650af0bca624baffee35","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/crypto/caam/caamalg_qi2.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.3"},{"lessThan":"6.3","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.134","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.81","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.22","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.12","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.134","versionStartIncluding":"6.3","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.81","versionStartIncluding":"6.3","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.22","versionStartIncluding":"6.3","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.12","versionStartIncluding":"6.3","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.3","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: caam - fix overflow on long hmac keys\n\nWhen a key longer than block size is supplied, it is copied and then\nhashed into the real key.  The memory allocated for the copy needs to\nbe rounded to DMA cache alignment, as otherwise the hashed key may\ncorrupt neighbouring memory.\n\nThe copying is performed using kmemdup, however this leads to an overflow:\nreading more bytes (aligned_len - keylen) from the keylen source buffer.\nFix this by replacing kmemdup with kmalloc, followed by memcpy."}],"metrics":[{"cvssV3_1":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"providerMetadata":{"dateUpdated":"2026-05-11T06:33:15.911Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/31022cfde5235c45fa765f0aabeff5f0652852f2"},{"url":"https://git.kernel.org/stable/c/c2fb4984fe09fc176fe4c12d5e3edf626df6511d"},{"url":"https://git.kernel.org/stable/c/aa545df011338df13f0833fc1fabcb15c0521959"},{"url":"https://git.kernel.org/stable/c/cebc5ebd958346195b77f42d0cd5141b4e448fae"},{"url":"https://git.kernel.org/stable/c/80688afb9c35b3934ce2d6be9973758915e2e0ef"}],"title":"crypto: caam - fix overflow on long hmac keys","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43330","datePublished":"2026-05-08T13:31:18.133Z","dateReserved":"2026-05-01T14:12:56.002Z","dateUpdated":"2026-05-11T06:33:15.911Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 14:16:42","lastModifiedDate":"2026-05-11 08:16:09","problem_types":[],"metrics":{"cvssMetricV31":[{"source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43330","Ordinal":"1","Title":"crypto: caam - fix overflow on long hmac keys","CVE":"CVE-2026-43330","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43330","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: caam - fix overflow on long hmac keys\n\nWhen a key longer than block size is supplied, it is copied and then\nhashed into the real key.  The memory allocated for the copy needs to\nbe rounded to DMA cache alignment, as otherwise the hashed key may\ncorrupt neighbouring memory.\n\nThe copying is performed using kmemdup, however this leads to an overflow:\nreading more bytes (aligned_len - keylen) from the keylen source buffer.\nFix this by replacing kmemdup with kmalloc, followed by memcpy.","Type":"Description","Title":"crypto: caam - fix overflow on long hmac keys"}]}}}