๐Ÿ” CVE Alert

CVE-2026-31676

UNKNOWN 0.0

rxrpc: only handle RESPONSE during service challenge

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: rxrpc: only handle RESPONSE during service challenge Only process RESPONSE packets while the service connection is still in RXRPC_CONN_SERVICE_CHALLENGING. Check that state under state_lock before running response verification and security initialization, then use a local secured flag to decide whether to queue the secured-connection work after the state transition. This keeps duplicate or late RESPONSE packets from re-running the setup path and removes the unlocked post-transition state test.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 25, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
17926a79320afa9b95df6b977b40cca6d8713cea < d0035e634dae83237ab7f5681eb52b2f65d0ceb8 17926a79320afa9b95df6b977b40cca6d8713cea < 03fd2ef73cb4ffd0af100a95b634af54f474414e 17926a79320afa9b95df6b977b40cca6d8713cea < c43ffdcfdbb5567b1f143556df8a04b4eeea041c
Linux / Linux
2.6.22

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d0035e634dae83237ab7f5681eb52b2f65d0ceb8 git.kernel.org: https://git.kernel.org/stable/c/03fd2ef73cb4ffd0af100a95b634af54f474414e git.kernel.org: https://git.kernel.org/stable/c/c43ffdcfdbb5567b1f143556df8a04b4eeea041c