Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: Compare MACs in constant time To prevent timing attacks, MAC comparisons need to be constant-time. Replace the memcmp() with the correct function, crypto_memneq().
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.15.1, < 6.1.167 |
References
- https://git.kernel.org/stable/c/2cdc56ed67615ba0921383a688f24415ebe065f3Patch
- https://git.kernel.org/stable/c/307afccb751f542246bd5dc68a2c1ffe1a78418cPatch
- https://git.kernel.org/stable/c/93c0a22fec914ec4b697e464895a0f594e29fb28Patch
- https://git.kernel.org/stable/c/c5794709bc9105935dbedef8b9cf9c06f2b559faPatch
- https://git.kernel.org/stable/c/cd52a0e309659537048a864211abc3ea4c5caa63Patch
- https://git.kernel.org/stable/c/f4588b85efd6007d46b80aa1b9fb746628ffb3dcPatch
FAQ
What is CVE-2026-23364?
CVE-2026-23364 is a vulnerability with a CVSS score of 7.4 (HIGH). In the Linux kernel, the following vulnerability has been resolved: ksmbd: Compare MACs in constant time To prevent timing attacks, MAC comparisons need to be constant-time. Replace the memcmp() wit...
How severe is CVE-2026-23364?
CVE-2026-23364 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23364?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.