CVE-2026-31640
HIGHrxrpc: Fix use of wrong skb when comparing queued RESP challenge serial
Title source: cnaDescription
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial In rxrpc_post_response(), the code should be comparing the challenge serial number from the cached response before deciding to switch to a newer response, but looks at the newer packet private data instead, rendering the comparison always false. Fix this by switching to look at the older packet. Fix further[1] to substitute the new packet in place of the old one if newer and also to release whichever we don't use.
Scores
CVSS v3
7.5
EPSS
0.0005
EPSS Percentile
15.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-401
Status
published
Products (11)
Linux/Linux
< 6.16
Linux/Linux
5800b1cf3fd8ccab752a101865be1e76dac33142 - 20386e7f8d97475b8d815873e246423317ec4260
Linux/Linux
5800b1cf3fd8ccab752a101865be1e76dac33142 - 9132b1a7bf83b4a8042fffbc99d075b727a16742
Linux/Linux
5800b1cf3fd8ccab752a101865be1e76dac33142 - b33f5741bb187db8ff32e8f5b96def77cc94dfca
Linux/Linux
6.16
Linux/Linux
6.18.23 - 6.18.*
Linux/Linux
6.19.13 - 6.19.*
Linux/Linux
7.0
linux/linux_kernel
6.16
linux/linux_kernel
7.0 rc1 (7 CPE variants)
... and 1 more
Published
Apr 24, 2026
Tracked Since
Apr 24, 2026