The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-43077

CVE-2026-43077: Linux Kernel Buffer Overflow Vulnerability

CVE-2026-43077 is a buffer overflow vulnerability in the Linux kernel's crypto algif_aead module affecting decryption operations. This article covers the technical details, affected versions, security impact, and mitigation.

Published: May 7, 2026

CVE-2026-43077 Overview

CVE-2026-43077 is a Linux kernel vulnerability in the algif_aead AEAD (Authenticated Encryption with Associated Data) socket interface of the kernel crypto subsystem. The minimum receive buffer size check did not account for the authentication tag length during decryption operations. The fix adds the required extra length to the minimum RX size validation. The patch is distributed across multiple stable kernel branches via several upstream commits.

Critical Impact

Insufficient buffer size validation in the kernel AEAD socket interface can lead to incorrect decryption handling when the receive buffer is undersized relative to the tag length.

Affected Products

  • Linux kernel (mainline and stable trees containing the algif_aead crypto user API)
  • Specific affected ranges are defined by the upstream stable commits referenced below
  • Distribution kernels that ship algif_aead and have not yet picked up the backported fix

Discovery Timeline

  • 2026-05-06 - CVE-2026-43077 published to NVD
  • 2026-05-06 - Last updated in NVD database

Technical Details for CVE-2026-43077

Vulnerability Analysis

The vulnerability resides in algif_aead, the AF_ALG kernel module that exposes the kernel's AEAD ciphers to userspace through socket operations. AEAD algorithms produce ciphertext plus an authentication tag during encryption and require both inputs during decryption. The receive-side buffer size check in the decryption path did not include the tag length when validating the minimum required buffer.

As a result, the kernel could accept a receive buffer that is smaller than the actual plaintext-plus-tag accounting requires. The fix adds the missing tag length to the minimum size calculation, ensuring algif_aead rejects undersized buffers before processing decryption requests.

Root Cause

The root cause is an Input Validation Error in the boundary check applied to the user-supplied receive buffer. The original logic compared the buffer size against the expected plaintext length without adding the tag size that AEAD decryption requires. This is a missing-length-component bug in size accounting rather than a memory-corruption primitive in the cryptographic transform itself.

Attack Vector

Exploitation requires local access to a system where a process can open an AF_ALG socket and bind it to an AEAD algorithm. A local user issues recvmsg() on the socket with a buffer that lacks the additional tag-length headroom. Without the corrected check, the decryption path proceeds with insufficient receive space accounting. The fix is contained to the algif_aead size validation and does not change the AEAD transform contract.

No verified public exploit code is available for this issue. Refer to the upstream commits for the precise change. See the upstream fix commit and the associated stable backports for the patch diffs.

Detection Methods for CVE-2026-43077

Indicators of Compromise

  • No file-based or network IOCs are published for this kernel issue
  • Kernel version strings indicating an unpatched build that still includes algif_aead without the tag-size fix
  • Audit traces of processes opening AF_ALG sockets with AEAD salg_type and issuing decryption recvmsg() calls

Detection Strategies

  • Inventory running kernels and compare against the fixed commit hashes listed in the stable tree references
  • Use auditd rules on the socket and bind syscalls to record AF_ALG usage by non-privileged processes
  • Flag userspace binaries that link against AF_ALG helper libraries on systems where kernel-side userspace crypto is not expected

Monitoring Recommendations

  • Monitor kernel package versions through configuration management and alert on hosts missing the backported fix
  • Track dmesg and kernel audit output for unusual algif_aead usage patterns from unprivileged UIDs
  • Correlate AF_ALG socket activity with process lineage to identify unexpected callers in production workloads

How to Mitigate CVE-2026-43077

Immediate Actions Required

  • Apply the kernel updates from your distribution that include the algif_aead minimum RX size fix
  • Identify the stable branch in use and verify it contains one of the upstream commits referenced in NVD
  • Restrict access to AF_ALG sockets where userspace cryptographic offload is not required

Patch Information

The fix is upstream in the Linux kernel crypto subsystem and has been backported to multiple stable trees. The relevant commits include 1c76b5675119, 3afdc15d6173, 3d14bd48e3a7, 74a66fdb5282, 78cea133daf7, af2fa2fbbced, e86ab1e56613, and fd427dd84f22. Consult the Linux stable tree for the exact diff and pull the distribution package that incorporates the corresponding backport.

Workarounds

  • Disable or unload the algif_aead module on systems that do not require userspace AEAD crypto via AF_ALG
  • Use seccomp or LSM policy to block socket(AF_ALG, ...) for workloads that should not access kernel crypto sockets
  • Constrain container and sandbox profiles to drop the AF_ALG address family where it is not needed
bash
# Configuration example
# Verify whether algif_aead is loaded
lsmod | grep algif_aead

# Prevent the module from loading at boot
echo 'blacklist algif_aead' | sudo tee /etc/modprobe.d/blacklist-algif_aead.conf

# Confirm running kernel version against patched commits
uname -r

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechLinux

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Git Kernel Commit

  • Git Kernel Commit

  • Git Kernel Commit

  • Git Kernel Commit

  • Git Kernel Commit

  • Git Kernel Commit

  • Git Kernel Commit

  • Git Kernel Commit
  • Related CVEs
  • CVE-2026-31747: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31748: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31729: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31707: Linux Kernel Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English