Description
In the Linux kernel, the following vulnerability has been resolved:

net/tcp-md5: Fix MAC comparison to be constant-time

To prevent timing attacks, MACs need to be compared in constant
time. Use the appropriate helper function for this.
Published: 2026-05-08
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the Linux kernel caused the verification of TCP MD5 signatures to be performed in a manner that leaked timing information, allowing an attacker to infer the correct MAC by measuring response times. The fix implements a constant‑time comparison to eliminate this side‑channel. The vulnerability is a classic timing side‑channel (CWE‑208) that could be exploited to forge packets or bypass authentication on TCP connections that use MD5 hashing.

Affected Systems

The affected vendor is Linux and the product is the Linux kernel. No specific kernel releases are enumerated in the CNA data, so any kernel version compiled before the commit that introduced the constant‑time comparison remains vulnerable.

Risk and Exploitability

The CVSS score of 7.0 marks this issue as high severity, and although the EPSS score is unavailable, it is not listed in CISA's KEV catalog. Based on the description, it is inferred that an attacker would deliver crafted TCP packets bearing MD5 signatures and monitor timing differences to recover the correct MAC. Successful exploitation could enable packet forgery or authentication bypass, impacting confidentiality and integrity of network traffic. The attack vector is likely network‑based and does not require privileged local access.

Generated by OpenCVE AI on May 9, 2026 at 04:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel update that includes the constant‑time TCP MD5 MAC comparison patch (e.g., kernels updated after the commits referenced in the advisory).
  • Reboot the system to load the updated kernel and ensure the patch takes effect.
  • If disabling TCP MD5 signatures is acceptable for non‑essential connections, temporarily turn off the feature until the kernel update can be applied; otherwise consider tightening firewall rules to restrict unsolicited MD5‑signed traffic.

Generated by OpenCVE AI on May 9, 2026 at 04:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 03:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-613

Sat, 09 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-208
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 08 May 2026 17:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-613

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net/tcp-md5: Fix MAC comparison to be constant-time To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.
Title net/tcp-md5: Fix MAC comparison to be constant-time
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:30.704Z

Reserved: 2026-05-01T14:12:56.006Z

Link: CVE-2026-43383

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:49.593

Modified: 2026-05-08T15:16:49.593

Link: CVE-2026-43383

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43383 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T04:30:17Z

Weaknesses