CVE-2026-31676
Received Received - Intake
Improper State Validation in Linux rxrpc Causes Security Risk

Publication date: 2026-04-25

Last updated on: 2026-04-27

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: rxrpc: only handle RESPONSE during service challenge Only process RESPONSE packets while the service connection is still in RXRPC_CONN_SERVICE_CHALLENGING. Check that state under state_lock before running response verification and security initialization, then use a local secured flag to decide whether to queue the secured-connection work after the state transition. This keeps duplicate or late RESPONSE packets from re-running the setup path and removes the unlocked post-transition state test.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-25
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's rxrpc component. It involves improper handling of RESPONSE packets during the service challenge phase of a connection. Specifically, the system should only process RESPONSE packets while the connection is in the RXRPC_CONN_SERVICE_CHALLENGING state. The fix ensures that the state is checked under a lock before verifying the response and initializing security, preventing duplicate or late RESPONSE packets from re-running the setup process and removing unsafe state checks after the transition.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow duplicate or late RESPONSE packets to interfere with the connection setup process in the rxrpc service. This might lead to improper security initialization or unexpected behavior in the connection handling, potentially weakening the security of the communication or causing instability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart