Impact
The vulnerability occurs in the Linux kernel's rxrpc implementation, where the function that verifies the length of a RESPONSE authenticator has an inverted check. This flaw, classified as CWE-130, is due to an incorrect comparison logic that accepts oversized authenticators and later causes the kernel to reach a BUG_ON, leading to a crash. This results in a denial‑of‑service condition by bringing the affected system down; there is no direct way for an attacker to gain code execution or data exfiltration.
Affected Systems
The flaw affects all Linux kernel releases that include the flawed rxrpc code. According to the provided CPE data, affected releases include the 6.16 kernel series and all 7.0 release candidates through rc7. Any system running those kernels without the fixed patch is vulnerable. Versions prior to the introduction of the vulnerability are unaffected.
Risk and Exploitability
The CVSS score of 7.5 designates a high severity, while the EPSS score of <1% indicates a very low likelihood of exploitation in the wild as of this analysis. The bug is not listed in the CISA KEV catalog. Exploitation requires an attacker to send a crafted rxrpc packet over the network, which may be difficult in environments that do not expose rxrpc services. Nevertheless, because the outcome is a system crash, the risk remains significant for systems that allow inbound rxrpc traffic.
OpenCVE Enrichment