CVE-2026-31676
rxrpc: only handle RESPONSE during service challenge
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: rxrpc: only handle RESPONSE during service challenge Only process RESPONSE packets while the service connection is still in RXRPC_CONN_SERVICE_CHALLENGING. Check that state under state_lock before running response verification and security initialization, then use a local secured flag to decide whether to queue the secured-connection work after the state transition. This keeps duplicate or late RESPONSE packets from re-running the setup path and removes the unlocked post-transition state test.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 25, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
17926a79320afa9b95df6b977b40cca6d8713cea < d0035e634dae83237ab7f5681eb52b2f65d0ceb8 17926a79320afa9b95df6b977b40cca6d8713cea < 03fd2ef73cb4ffd0af100a95b634af54f474414e 17926a79320afa9b95df6b977b40cca6d8713cea < c43ffdcfdbb5567b1f143556df8a04b4eeea041c
Linux / Linux
2.6.22