-

CVE-2026-31400

sunrpc: fix cache_request leak in cache_release

In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix cache_request leak in cache_release

When a reader's file descriptor is closed while in the middle of reading
a cache_request (rp->offset != 0), cache_release() decrements the
request's readers count but never checks whether it should free the
request.

In cache_read(), when readers drops to 0 and CACHE_PENDING is clear, the
cache_request is removed from the queue and freed along with its buffer
and cache_head reference. cache_release() lacks this cleanup.

The only other path that frees requests with readers == 0 is
cache_dequeue(), but it runs only when CACHE_PENDING transitions from
set to clear. If that transition already happened while readers was
still non-zero, cache_dequeue() will have skipped the request, and no
subsequent call will clean it up.

Add the same cleanup logic from cache_read() to cache_release(): after
decrementing readers, check if it reached 0 with CACHE_PENDING clear,
and if so, dequeue and free the cache_request.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < 1dfedb293943e491379c9302b428e6f920a73d12
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < f18c1f2a88ca91357916997cdb0f7adaf14fc497
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < 7bcd5e318876ac638c8ceade7a648e76ac8c48e1
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < 41f6ba6c98a618043d2cd71030bf9a752dfab8b2
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < 301670dcd098c1fe5c2fe90fb3c7a8f4814d2351
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < be5c35960e5ead70862736161836e2d1bc7352dc
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < 373457de14281c1fc7cace6fc4c8a267fc176673
Status affected
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Version < 17ad31b3a43b72aec3a3d83605891e1397d0d065
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.12
Status affected
Version 0
Version < 2.6.12
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.20
Status unaffected
Version <= 6.19.*
Version 6.19.10
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.102
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.