Description
In the Linux kernel, the following vulnerability has been resolved:

rxrpc: fix reference count leak in rxrpc_server_keyring()

This patch fixes a reference count leak in rxrpc_server_keyring()
by checking if rx->securities is already set.
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via reference count leak in the Linux kernel RxRPC server keyring
Action: Patch
AI Analysis

Impact

The vulnerability resides in the Linux kernel’s RxRPC server keyring implementation and manifests as a reference count leak that occurs when the function does not verify whether the security context has already been set. The unchecked increment allows the kernel to retain an extra reference to the keyring object indefinitely, which over time can exhaust system resources or lead to memory corruption. This weakness corresponds to a moderate severity (CVSS 5.5) and is classified under CWE‑911 (Unchecked Error Condition). The primary consequence is a denial‑of‑service condition that may be triggered by local privileged processes that use RxRPC services.

Affected Systems

All Linux kernel releases are flagged as affected by the change. The Common Platform Enumeration list includes the generic Linux kernel as well as specific versions such as 2.6.22 and the 7.0 release candidate series (rc1‑rc7). The patch applies to every build of the kernel that incorporates the commit referenced in the advisory, so any system running a pre‑patch kernel in those families is potentially impacted.

Risk and Exploitability

With a CVSS score of 5.5 the vulnerability poses a moderate threat. The EPSS score is less than 1%, indicating a low exploitation probability at present, and the vulnerability is not currently listed in the CISA KEV catalog. Based on the description, it is inferred that the vulnerability would likely be exploited by a local user or process with sufficient privileges to interact with RxRPC services, triggering the leak. Remote exploitation appears unlikely because RxRPC interactions occur within the kernel’s internal networking stack rather than over a network socket that accepts arbitrary input. The risk therefore hinges on local users or privileged processes that have access to the affected services.

Generated by OpenCVE AI on April 28, 2026 at 20:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that contains the commit fixing the reference count leak in rxrpc_server_keyring()
  • Reboot the system into the patched kernel to activate the fix and ensure the kernel image is using the updated code
  • If RxRPC services are not required, disable the RxRPC module or block its associated ports to prevent its use

Generated by OpenCVE AI on April 28, 2026 at 20:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6238-1 linux security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:o:linux:linux_kernel:2.6.22:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-911
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix reference count leak in rxrpc_server_keyring() This patch fixes a reference count leak in rxrpc_server_keyring() by checking if rx->securities is already set.
Title rxrpc: fix reference count leak in rxrpc_server_keyring()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:12:36.423Z

Reserved: 2026-03-09T15:48:24.125Z

Link: CVE-2026-31634

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:42.707

Modified: 2026-04-27T20:30:25.177

Link: CVE-2026-31634

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31634 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T20:15:26Z

Weaknesses