CVE-2026-31719
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2026
Last modified:
06/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
crypto: krb5enc - fix async decrypt skipping hash verification<br />
<br />
krb5enc_dispatch_decrypt() sets req->base.complete as the skcipher<br />
callback, which is the caller&#39;s own completion handler. When the<br />
skcipher completes asynchronously, this signals "done" to the caller<br />
without executing krb5enc_dispatch_decrypt_hash(), completely bypassing<br />
the integrity verification (hash check).<br />
<br />
Compare with the encrypt path which correctly uses<br />
krb5enc_encrypt_done as an intermediate callback to chain into the<br />
hash computation on async completion.<br />
<br />
Fix by adding krb5enc_decrypt_done as an intermediate callback that<br />
chains into krb5enc_dispatch_decrypt_hash() upon async skcipher<br />
completion, matching the encrypt path&#39;s callback pattern.<br />
<br />
Also fix EBUSY/EINPROGRESS handling throughout: remove<br />
krb5enc_request_complete() which incorrectly swallowed EINPROGRESS<br />
notifications that must be passed up to callers waiting on backlogged<br />
requests, and add missing EBUSY checks in krb5enc_encrypt_ahash_done<br />
for the dispatch_encrypt return value.<br />
<br />
<br />
Unset MAY_BACKLOG on the async completion path so the user won&#39;t<br />
see back-to-back EINPROGRESS notifications.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.15 (including) | 6.18.25 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 7.0.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.1:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



