Impact
The vulnerability occurs in the Linux kernel’s rxrpc implementation where the response authenticator parser incorrectly calculates a parser limit, causing an out‑of‑bounds read of a temporary buffer when a malformed RESPONSE packet is processed. This bug can leak contents of kernel memory and may serve as a stepping stone for further exploitation. This weakness is identified as CWE-125.
Affected Systems
All Linux kernel releases before the commit that fixed the bug, specifically kernel 6.16 and all 7.0 release candidates (rc1 through rc7) as well as earlier kernel revisions. The issue is present in the mainline Linux kernel and is not limited to a specific distribution.
Risk and Exploitability
The CVSS score of 9.1 combined with an EPSS score of less than 1% indicates a highly severe weakness that is currently considered unlikely to be exploited at scale. The vulnerability can be triggered via a malicious rxrpc packet sent over a network connection; it does not require local privilege escalation. The bug is not listed in the CISA KEV catalog, but its severity warrants immediate mitigations. It is classified as CWE-125.
OpenCVE Enrichment