CVE-2026-31662
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/04/2026
Última modificación:
24/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG<br />
<br />
The GRP_ACK_MSG handler in tipc_group_proto_rcv() currently decrements<br />
bc_ackers on every inbound group ACK, even when the same member has<br />
already acknowledged the current broadcast round.<br />
<br />
Because bc_ackers is a u16, a duplicate ACK received after the last<br />
legitimate ACK wraps the counter to 65535. Once wrapped,<br />
tipc_group_bc_cong() keeps reporting congestion and later group<br />
broadcasts on the affected socket stay blocked until the group is<br />
recreated.<br />
<br />
Fix this by ignoring duplicate or stale ACKs before touching bc_acked or<br />
bc_ackers. This makes repeated GRP_ACK_MSG handling idempotent and<br />
prevents the underflow path.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/1b6f13f626665cac67ba5a012765427680518711
- https://git.kernel.org/stable/c/36ec4fdd6250dcd5e73eb09ea92ed92e9cc28412
- https://git.kernel.org/stable/c/3bcf7aca63f0bcd679ae28e9b99823c608e59ce3
- https://git.kernel.org/stable/c/48a5fe38772b6f039522469ee6131a67838221a8
- https://git.kernel.org/stable/c/575faea557f1a184a5f09661bd47ebd3ef3769f8
- https://git.kernel.org/stable/c/a2ea1ef0167d7a84730638d05c20ccdc421b14b6
- https://git.kernel.org/stable/c/a7db57ccca21f5801609065473c89a38229ecb92
- https://git.kernel.org/stable/c/e0bb732eaf77f9ac2f2638bdac9e39b81e0a9682



