| Name | CVE-2026-31746 |
| Description | In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: Fix memory leak with CCA cards used as accelerator Tests showed that there is a memory leak if CCA cards are used as accelerator for clear key RSA requests (ME and CRT). With the last rework for the memory allocation the AP messages are allocated by ap_init_apmsg() but for some reason on two places (ME and CRT) the older allocation was still in place. So the first allocation simple was never freed. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| linux (PTS) | bullseye | 5.10.223-1 | fixed |
| bullseye (security) | 5.10.251-5 | fixed |
| bookworm | 6.1.170-3 | fixed |
| bookworm (security) | 6.1.172-1 | fixed |
| trixie | 6.12.86-1 | fixed |
| trixie (security) | 6.12.90-1 | fixed |
| forky | 7.0.7-1 | fixed |
| sid | 7.0.9-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| linux | source | bullseye | (not affected) | | | |
| linux | source | bookworm | (not affected) | | | |
| linux | source | trixie | (not affected) | | | |
| linux | source | (unstable) | 6.19.12-1 | | | |
Notes
[trixie] - linux <not-affected> (Vulnerable code not present)
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
https://git.kernel.org/linus/c8d46f17c2fc7d25c18e60c008928aecab26184d (7.0-rc7)