Description
In the Linux kernel, the following vulnerability has been resolved:

s390/zcrypt: Fix memory leak with CCA cards used as accelerator

Tests showed that there is a memory leak if CCA cards are used as
accelerator for clear key RSA requests (ME and CRT). With the last
rework for the memory allocation the AP messages are allocated by
ap_init_apmsg() but for some reason on two places (ME and CRT) the
older allocation was still in place. So the first allocation simple
was never freed.
Published: 2026-05-01
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel for the s390 architecture, a memory leak exists in the zcrypt subsystem when CCA cards are employed as accelerators for clear‑key RSA requests using the ME and CRT modes. The flaw occurs because a prior allocation performed by ap_init_apmsg() is never deallocated in these code paths, causing persistent kernel memory usage each time such requests are processed. The result is uncontrolled consumption of kernel RAM, which can lead to system instability or a complete denial of service as memory resources are exhausted.

Affected Systems

Systems running a Linux kernel on s390 hardware that utilize CCA card acceleration for RSA clear‑key operations are affected. The specific kernel versions are not listed in the advisory, but any build that incorporates the unpatched zcrypt code for ME or CRT pathways may be vulnerable.

Risk and Exploitability

The CVSS score is not provided, and the EPSS metric is unavailable, which suggests the current publicly known exploitation likelihood is uncertain. Nonetheless, because the vulnerability can be triggered by normal kernel operation of zcrypt via user‑space applications that initiate clear‑key RSA requests, an attacker who can force repeated requests could deplete kernel memory and cause a denial of service. The flaw is listed as not being part of the CISA KEV catalog, indicating no known active exploitation but still a significant risk if the vulnerability is present.

Generated by OpenCVE AI on May 2, 2026 at 10:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that incorporates the zcrypt memory‑leak fix (commit 586222c37d4027dbf60a604fbe820184fee7c1c9).
  • Reboot the system so that the patched kernel and zcrypt module are loaded.
  • Monitor kernel memory usage related to zcrypt operations to confirm the leak has been eliminated.

Generated by OpenCVE AI on May 2, 2026 at 10:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 10:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Sat, 02 May 2026 00:15:00 +0000


Fri, 01 May 2026 23:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: Fix memory leak with CCA cards used as accelerator Tests showed that there is a memory leak if CCA cards are used as accelerator for clear key RSA requests (ME and CRT). With the last rework for the memory allocation the AP messages are allocated by ap_init_apmsg() but for some reason on two places (ME and CRT) the older allocation was still in place. So the first allocation simple was never freed.
Title s390/zcrypt: Fix memory leak with CCA cards used as accelerator
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:14:40.196Z

Reserved: 2026-03-09T15:48:24.138Z

Link: CVE-2026-31746

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:37.363

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31746

cve-icon Redhat

Severity :

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-31746 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T10:30:40Z

Weaknesses