CVE-2026-43330 POC (Proof-of-Concept)

CVE-2026-43330 POC (Proof-of-Concept)

In the Linux kernel, the following vulnerability has been resolved:
crypto: caam - fix overflow on long hmac keys
When a key longer than block size is supplied, it is copied and then
hashed into the real key. The memory allocated for the copy needs to
be rounded to DMA cache alignment, as otherwise the hashed key may
corrupt neighbouring memory.
The copying is performed using kmemdup, however this leads to an overflow:
reading more bytes (aligned_len - keylen) from the keylen source buffer.
Fix this by replacing kmemdup with kmalloc, followed by memcpy.

Published: 2026-05-08

CVSS: 7.8

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Download CVE-2026-43330 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://hokyo.gr/poc-496-cve-2026-43198/

https://hokyo.gr/poc-794-cve-2026-42271/

https://hokyo.gr/poc-196-cve-2026-7685/

https://hokyo.gr/poc-12-cve-2026-7549/

Copyright 2017- 2025 Hokyo JapanEats ©