Home

Description

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix key reference count leak from call->key When creating a client call in rxrpc_alloc_client_call(), the code obtains a reference to the key. This is never cleaned up and gets leaked when the call is destroyed. Fix this by freeing call->key in rxrpc_destroy_call(). Before the patch, it shows the key reference counter elevated: $ cat /proc/keys | grep afs@54321 1bffe9cd I--Q--i 8053480 4169w 3b010000 1000 1000 rxrpc afs@54321: ka $ After the patch, the invalidated key is removed when the code exits: $ cat /proc/keys | grep afs@54321 $

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-24 | Assigner Linux

Product status

Default status
unaffected

f3441d4125fc98995858550a5521b8d7daf0504a (git) before f1a7a3ab0f35f83cf11bba906b9e948cf3788c28
affected

f3441d4125fc98995858550a5521b8d7daf0504a (git) before e6b7943c5dc875647499da09bf4d50a8557ab0c3
affected

f3441d4125fc98995858550a5521b8d7daf0504a (git) before 2e6ef713b1598f6acd7f302fa6b12b6731c89914
affected

f3441d4125fc98995858550a5521b8d7daf0504a (git) before 978108902ee4ef2b348ff7ec36ad014dc5bc6dc6
affected

f3441d4125fc98995858550a5521b8d7daf0504a (git) before d666540d217e8d420544ebdfbadeedd623562733
affected

Default status
affected

6.2
affected

Any version before 6.2
unaffected

6.6.135 (semver)
unaffected

6.12.82 (semver)
unaffected

6.18.23 (semver)
unaffected

6.19.13 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/f1a7a3ab0f35f83cf11bba906b9e948cf3788c28

git.kernel.org/...c/e6b7943c5dc875647499da09bf4d50a8557ab0c3

git.kernel.org/...c/2e6ef713b1598f6acd7f302fa6b12b6731c89914

git.kernel.org/...c/978108902ee4ef2b348ff7ec36ad014dc5bc6dc6

git.kernel.org/...c/d666540d217e8d420544ebdfbadeedd623562733

cve.org (CVE-2026-31639)

nvd.nist.gov (CVE-2026-31639)

Download JSON