Home

Description

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix key parsing memleak In rxrpc_preparse_xdr_yfs_rxgk(), the memory attached to token->rxgk can be leaked in a few error paths after it's allocated. Fix this by freeing it in the "reject_token:" case.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-24 | Assigner Linux

Product status

Default status
unaffected

0ca100ff4df64f5d0f6c1dd5080c3e096786bea6 (git) before d5f76f812d2c0ea6dd651b0586be49e85ecca085
affected

0ca100ff4df64f5d0f6c1dd5080c3e096786bea6 (git) before 01f51318feb626deee1d0c8a190198cd7857d599
affected

0ca100ff4df64f5d0f6c1dd5080c3e096786bea6 (git) before b555912b9b21075e8298015f888ffe3ff60b1a97
affected

Default status
affected

6.16
affected

Any version before 6.16
unaffected

6.18.23 (semver)
unaffected

6.19.13 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/d5f76f812d2c0ea6dd651b0586be49e85ecca085

git.kernel.org/...c/01f51318feb626deee1d0c8a190198cd7857d599

git.kernel.org/...c/b555912b9b21075e8298015f888ffe3ff60b1a97

cve.org (CVE-2026-31643)

nvd.nist.gov (CVE-2026-31643)

Download JSON