Description
In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix key reference count leak from call->key

When creating a client call in rxrpc_alloc_client_call(), the code obtains
a reference to the key. This is never cleaned up and gets leaked when the
call is destroyed.

Fix this by freeing call->key in rxrpc_destroy_call().

Before the patch, it shows the key reference counter elevated:

$ cat /proc/keys | grep afs@54321
1bffe9cd I--Q--i 8053480 4169w 3b010000 1000 1000 rxrpc afs@54321: ka
$

After the patch, the invalidated key is removed when the code exits:

$ cat /proc/keys | grep afs@54321
$
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Resource Leak in Linux Kernel via rxrpc key reference count retention leading to potential denial‑of‑service
Action: Apply Patches
AI Analysis

Impact

The vulnerability resides in the Linux kernel’s rxrpc subsystem. When a client call is allocated, the code increments the reference count of the associated key but never decrements it upon call destruction, causing a reference count leak. The leaked key remains visible in /proc/keys, and over time the kernel key table can grow, potentially exhausting kernel resources and degrading system stability. This weakness is a classic reference‑count management flaw, identified as CWE-911, and the CVE is also tagged with NVD‑CWE‑Other, indicating an additional unspecified weakness.

Affected Systems

Affected systems include any Linux kernel that incorporates the rxrpc client implementation prior to the patch, specifically kernels 6.2 and the 7.0 release candidates through rc7. All variants declared in the CPE list (linux_kernel) are vulnerable until the fix is applied.

Risk and Exploitability

The CVSS score of 5.5 classifies the risk as moderate, while an EPSS score of less than 1% indicates a very low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be local or dependent on services that use rxrpc; the leak does not provide direct code execution or remote privilege escalation, but could be leveraged to exhaust the kernel key table. Users should consider the patch as the preferred remediation, and monitor for anomalous key growth if a patch cannot be immediately applied.

Generated by OpenCVE AI on April 28, 2026 at 13:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch that releases call->key in rxrpc_destroy_call().
  • Upgrade the kernel to a version that includes the fix (e.g., any 6.2 or 7.0 rc releases after the commit).
  • If an immediate kernel upgrade is not possible, disable the rxrpc protocol or restrict its use until the patch is applied.

Generated by OpenCVE AI on April 28, 2026 at 13:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Tue, 28 Apr 2026 00:15:00 +0000


Mon, 27 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:o:linux:linux_kernel:6.2:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix key reference count leak from call->key When creating a client call in rxrpc_alloc_client_call(), the code obtains a reference to the key. This is never cleaned up and gets leaked when the call is destroyed. Fix this by freeing call->key in rxrpc_destroy_call(). Before the patch, it shows the key reference counter elevated: $ cat /proc/keys | grep afs@54321 1bffe9cd I--Q--i 8053480 4169w 3b010000 1000 1000 rxrpc afs@54321: ka $ After the patch, the invalidated key is removed when the code exits: $ cat /proc/keys | grep afs@54321 $
Title rxrpc: Fix key reference count leak from call->key
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:12:42.283Z

Reserved: 2026-03-09T15:48:24.125Z

Link: CVE-2026-31639

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:43.240

Modified: 2026-04-27T20:20:27.680

Link: CVE-2026-31639

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31639 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:00:16Z

Weaknesses