CVE-2026-31662 PUBLISHED

tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG

Assigner: Linux
Reserved: 09.03.2026 Published: 24.04.2026 Updated: 24.04.2026

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG

The GRP_ACK_MSG handler in tipc_group_proto_rcv() currently decrements bc_ackers on every inbound group ACK, even when the same member has already acknowledged the current broadcast round.

Because bc_ackers is a u16, a duplicate ACK received after the last legitimate ACK wraps the counter to 65535. Once wrapped, tipc_group_bc_cong() keeps reporting congestion and later group broadcasts on the affected socket stay blocked until the group is recreated.

Fix this by ignoring duplicate or stale ACKs before touching bc_acked or bc_ackers. This makes repeated GRP_ACK_MSG handling idempotent and prevents the underflow path.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 2f487712b89376fce267223bbb0db93d393d4b09 to a7db57ccca21f5801609065473c89a38229ecb92 (excl.)
  • affected from 2f487712b89376fce267223bbb0db93d393d4b09 to 36ec4fdd6250dcd5e73eb09ea92ed92e9cc28412 (excl.)
  • affected from 2f487712b89376fce267223bbb0db93d393d4b09 to 575faea557f1a184a5f09661bd47ebd3ef3769f8 (excl.)
  • affected from 2f487712b89376fce267223bbb0db93d393d4b09 to 3bcf7aca63f0bcd679ae28e9b99823c608e59ce3 (excl.)
  • affected from 2f487712b89376fce267223bbb0db93d393d4b09 to a2ea1ef0167d7a84730638d05c20ccdc421b14b6 (excl.)
  • affected from 2f487712b89376fce267223bbb0db93d393d4b09 to 1b6f13f626665cac67ba5a012765427680518711 (excl.)
  • affected from 2f487712b89376fce267223bbb0db93d393d4b09 to e0bb732eaf77f9ac2f2638bdac9e39b81e0a9682 (excl.)
  • affected from 2f487712b89376fce267223bbb0db93d393d4b09 to 48a5fe38772b6f039522469ee6131a67838221a8 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 4.15 is affected
  • unaffected from 0 to 4.15 (excl.)
  • unaffected from 5.10.253 to 5.10.* (incl.)
  • unaffected from 5.15.203 to 5.15.* (incl.)
  • unaffected from 6.1.169 to 6.1.* (incl.)
  • unaffected from 6.6.135 to 6.6.* (incl.)
  • unaffected from 6.12.82 to 6.12.* (incl.)
  • unaffected from 6.18.23 to 6.18.* (incl.)
  • unaffected from 6.19.13 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References