CVE-2026-31640

HIGH

rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial

Title source: cna
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial In rxrpc_post_response(), the code should be comparing the challenge serial number from the cached response before deciding to switch to a newer response, but looks at the newer packet private data instead, rendering the comparison always false. Fix this by switching to look at the older packet. Fix further[1] to substitute the new packet in place of the old one if newer and also to release whichever we don't use.

Scores

CVSS v3 7.5
EPSS 0.0005
EPSS Percentile 15.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-401
Status published
Products (11)
Linux/Linux < 6.16
Linux/Linux 5800b1cf3fd8ccab752a101865be1e76dac33142 - 20386e7f8d97475b8d815873e246423317ec4260
Linux/Linux 5800b1cf3fd8ccab752a101865be1e76dac33142 - 9132b1a7bf83b4a8042fffbc99d075b727a16742
Linux/Linux 5800b1cf3fd8ccab752a101865be1e76dac33142 - b33f5741bb187db8ff32e8f5b96def77cc94dfca
Linux/Linux 6.16
Linux/Linux 6.18.23 - 6.18.*
Linux/Linux 6.19.13 - 6.19.*
Linux/Linux 7.0
linux/linux_kernel 6.16
linux/linux_kernel 7.0 rc1 (7 CPE variants)
... and 1 more
Published Apr 24, 2026
Tracked Since Apr 24, 2026