Description
In the Linux kernel, the following vulnerability has been resolved:

rxrpc, afs: Fix missing error pointer check after rxrpc_kernel_lookup_peer()

rxrpc_kernel_lookup_peer() can also return error pointers in addition to
NULL, so just checking for NULL is not sufficient.

Fix this by:

(1) Changing rxrpc_kernel_lookup_peer() to return -ENOMEM rather than NULL
on allocation failure.

(2) Making the callers in afs use IS_ERR() and PTR_ERR() to pass on the
error code returned.
Published: 2026-05-08
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A missing check for error pointers in the Linux kernel's rxrpc subsystem can cause the afs module to treat an error state as a valid object. The function rxrpc_kernel_lookup_peer() may return error pointers instead of NULL, but callers only verify for NULL. When an error pointer is interpreted as a valid address and dereferenced, this can trigger a kernel crash, leading to a denial of service for the local system.

Affected Systems

All Linux kernel releases that include the rxrpc and afs components and that were built before the commit that fixes the error‑pointer handling are affected. This includes any distribution's kernel that has not yet been updated to incorporate the patch referenced in the advisory.

Risk and Exploitability

The EPSS score of <1% indicates a very low likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Because the flaw requires the kernel to process an rxrpc or afs request, the likely attack vector is local or involves trusted network traffic with sufficient privileges. The CVSS score of 7.0 reflects a Medium severity impact, primarily the loss of availability through a kernel crash.

Generated by OpenCVE AI on May 9, 2026 at 16:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Linux kernel release that includes the rxrpc error‑pointer fix.
  • If a kernel upgrade cannot be performed immediately, block or restrict network traffic to the rxrpc protocol and disable any AFS services that are not needed, thereby preventing the vulnerable code path from being exercised.
  • Enable detailed kernel crash logging and configure alerting for unexpected kernel panics to quickly detect possible exploitation attempts.
  • Review local process permissions and restrict privileged programs from interacting with afs or rxrpc modules until a patch is deployed.

Generated by OpenCVE AI on May 9, 2026 at 16:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Sat, 09 May 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-252
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 08 May 2026 17:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: rxrpc, afs: Fix missing error pointer check after rxrpc_kernel_lookup_peer() rxrpc_kernel_lookup_peer() can also return error pointers in addition to NULL, so just checking for NULL is not sufficient. Fix this by: (1) Changing rxrpc_kernel_lookup_peer() to return -ENOMEM rather than NULL on allocation failure. (2) Making the callers in afs use IS_ERR() and PTR_ERR() to pass on the error code returned.
Title rxrpc, afs: Fix missing error pointer check after rxrpc_kernel_lookup_peer()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:22:25.346Z

Reserved: 2026-05-01T14:12:56.010Z

Link: CVE-2026-43463

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:59.183

Modified: 2026-05-08T15:16:59.183

Link: CVE-2026-43463

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43463 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T16:30:37Z

Weaknesses