{"id":"CVE-2026-31400","summary":"sunrpc: fix cache_request leak in cache_release","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix cache_request leak in cache_release\n\nWhen a reader's file descriptor is closed while in the middle of reading\na cache_request (rp-\u003eoffset != 0), cache_release() decrements the\nrequest's readers count but never checks whether it should free the\nrequest.\n\nIn cache_read(), when readers drops to 0 and CACHE_PENDING is clear, the\ncache_request is removed from the queue and freed along with its buffer\nand cache_head reference. cache_release() lacks this cleanup.\n\nThe only other path that frees requests with readers == 0 is\ncache_dequeue(), but it runs only when CACHE_PENDING transitions from\nset to clear. If that transition already happened while readers was\nstill non-zero, cache_dequeue() will have skipped the request, and no\nsubsequent call will clean it up.\n\nAdd the same cleanup logic from cache_read() to cache_release(): after\ndecrementing readers, check if it reached 0 with CACHE_PENDING clear,\nand if so, dequeue and free the cache_request.","modified":"2026-04-19T04:18:55.415567Z","published":"2026-04-03T15:16:03.906Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31400.json","cna_assigner":"Linux"},"references":[{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"},{"type":"WEB","url":"https://git.kernel.org/stable/c/17ad31b3a43b72aec3a3d83605891e1397d0d065"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1dfedb293943e491379c9302b428e6f920a73d12"},{"type":"WEB","url":"https://git.kernel.org/stable/c/301670dcd098c1fe5c2fe90fb3c7a8f4814d2351"},{"type":"WEB","url":"https://git.kernel.org/stable/c/373457de14281c1fc7cace6fc4c8a267fc176673"},{"type":"WEB","url":"https://git.kernel.org/stable/c/41f6ba6c98a618043d2cd71030bf9a752dfab8b2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7bcd5e318876ac638c8ceade7a648e76ac8c48e1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/be5c35960e5ead70862736161836e2d1bc7352dc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f18c1f2a88ca91357916997cdb0f7adaf14fc497"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31400.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31400"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"1dfedb293943e491379c9302b428e6f920a73d12"},{"fixed":"f18c1f2a88ca91357916997cdb0f7adaf14fc497"},{"fixed":"7bcd5e318876ac638c8ceade7a648e76ac8c48e1"},{"fixed":"41f6ba6c98a618043d2cd71030bf9a752dfab8b2"},{"fixed":"301670dcd098c1fe5c2fe90fb3c7a8f4814d2351"},{"fixed":"be5c35960e5ead70862736161836e2d1bc7352dc"},{"fixed":"373457de14281c1fc7cace6fc4c8a267fc176673"},{"fixed":"17ad31b3a43b72aec3a3d83605891e1397d0d065"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31400.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.12"},{"fixed":"5.10.253"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.203"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.167"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.130"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.78"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.20"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31400.json"}}],"schema_version":"1.7.5"}