Impact
The vulnerability resides in the Linux kernel’s RxRPC server keyring implementation and manifests as a reference count leak that occurs when the function does not verify whether the security context has already been set. The unchecked increment allows the kernel to retain an extra reference to the keyring object indefinitely, which over time can exhaust system resources or lead to memory corruption. This weakness corresponds to a moderate severity (CVSS 5.5) and is classified under CWE‑911 (Unchecked Error Condition). The primary consequence is a denial‑of‑service condition that may be triggered by local privileged processes that use RxRPC services.
Affected Systems
All Linux kernel releases are flagged as affected by the change. The Common Platform Enumeration list includes the generic Linux kernel as well as specific versions such as 2.6.22 and the 7.0 release candidate series (rc1‑rc7). The patch applies to every build of the kernel that incorporates the commit referenced in the advisory, so any system running a pre‑patch kernel in those families is potentially impacted.
Risk and Exploitability
With a CVSS score of 5.5 the vulnerability poses a moderate threat. The EPSS score is less than 1%, indicating a low exploitation probability at present, and the vulnerability is not currently listed in the CISA KEV catalog. Based on the description, it is inferred that the vulnerability would likely be exploited by a local user or process with sufficient privileges to interact with RxRPC services, triggering the leak. Remote exploitation appears unlikely because RxRPC interactions occur within the kernel’s internal networking stack rather than over a network socket that accepts arbitrary input. The risk therefore hinges on local users or privileged processes that have access to the affected services.
OpenCVE Enrichment
Debian DLA
Debian DSA