CVE-2026-31719
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
crypto: krb5enc - fix async decrypt skipping hash verification<br />
<br />
krb5enc_dispatch_decrypt() sets req->base.complete as the skcipher<br />
callback, which is the caller&#39;s own completion handler. When the<br />
skcipher completes asynchronously, this signals "done" to the caller<br />
without executing krb5enc_dispatch_decrypt_hash(), completely bypassing<br />
the integrity verification (hash check).<br />
<br />
Compare with the encrypt path which correctly uses<br />
krb5enc_encrypt_done as an intermediate callback to chain into the<br />
hash computation on async completion.<br />
<br />
Fix by adding krb5enc_decrypt_done as an intermediate callback that<br />
chains into krb5enc_dispatch_decrypt_hash() upon async skcipher<br />
completion, matching the encrypt path&#39;s callback pattern.<br />
<br />
Also fix EBUSY/EINPROGRESS handling throughout: remove<br />
krb5enc_request_complete() which incorrectly swallowed EINPROGRESS<br />
notifications that must be passed up to callers waiting on backlogged<br />
requests, and add missing EBUSY checks in krb5enc_encrypt_ahash_done<br />
for the dispatch_encrypt return value.<br />
<br />
<br />
Unset MAY_BACKLOG on the async completion path so the user won&#39;t<br />
see back-to-back EINPROGRESS notifications.
Impacto
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.15 (incluyendo) | 6.18.25 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 7.0.2 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:7.1:rc1:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



