Home

Description

In the Linux kernel, the following vulnerability has been resolved: crash_dump: don't log dm-crypt key bytes in read_key_from_user_keying When debug logging is enabled, read_key_from_user_keying() logs the first 8 bytes of the key payload and partially exposes the dm-crypt key. Stop logging any key bytes.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-24 | Assigner Linux

Product status

Default status
unaffected

479e58549b0fa7e80f1e0b9e69e0a2a8e6711132 (git) before 4897bd307ba8757c31a3325ba6730961be606016
affected

479e58549b0fa7e80f1e0b9e69e0a2a8e6711132 (git) before ed8d91f469845d62d44c565a55d2ab1767969357
affected

479e58549b0fa7e80f1e0b9e69e0a2a8e6711132 (git) before 36f46b0e36892eba08978eef7502ff3c94ddba77
affected

Default status
affected

6.16
affected

Any version before 6.16
unaffected

6.18.20 (semver)
unaffected

6.19.10 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/4897bd307ba8757c31a3325ba6730961be606016

git.kernel.org/...c/ed8d91f469845d62d44c565a55d2ab1767969357

git.kernel.org/...c/36f46b0e36892eba08978eef7502ff3c94ddba77

cve.org (CVE-2026-31543)

nvd.nist.gov (CVE-2026-31543)

Download JSON