CVE-2026-31719
Linux Kernel KRB5 Encryption Hash Verification Bypass
Publication date: 2026-05-01
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 7.1 |
| linux | linux_kernel | From 6.19 (inc) to 7.0.2 (exc) |
| linux | linux_kernel | From 6.15 (inc) to 6.18.25 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's crypto subsystem, specifically in the krb5enc encryption module. The issue is that during asynchronous decryption, the completion callback skips the hash verification step, which is essential for ensuring data integrity. The function krb5enc_dispatch_decrypt() sets the completion callback to the caller's own handler, which causes the hash verification function krb5enc_dispatch_decrypt_hash() to be bypassed when the decryption completes asynchronously. This means the integrity check is not performed, potentially allowing corrupted or tampered data to be accepted as valid.
The fix involves adding an intermediate callback, krb5enc_decrypt_done, that ensures the hash verification is executed after asynchronous decryption completes, aligning the decrypt path with the encrypt path's correct callback chaining. Additional fixes address error handling related to EBUSY and EINPROGRESS states to properly manage backlogged requests.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing data integrity verification to be bypassed during asynchronous decryption operations in the Linux kernel's krb5enc module. Without proper hash verification, corrupted or maliciously altered data could be accepted as valid, potentially leading to security issues such as data tampering or unauthorized data manipulation.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by fixing the asynchronous decrypt path in the krb5enc crypto module. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.
- Apply the latest Linux kernel updates that address the krb5enc async decrypt hash verification issue.
- Restart affected services or systems after applying the kernel update to ensure the fix is active.