CVE-2026-43226
State Transition Bypass in Linux Kernel RDS
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's RDS (Reliable Datagram Sockets) connection handling code. Specifically, it involves improper state transitions when an RDS connection enters the error state "RDS_CONN_ERROR." Normally, connections in this error state should follow a shutdown path. However, a shortcut was introduced that allowed the connection to bypass this shutdown path and move directly back to a connecting state. This caused the shutdown code to encounter unexpected states, leading to errors and leaving shutdown work queued indefinitely.
The fix involves two main changes: first, preventing the shortcut out of the error state so that the shutdown path is always followed; second, updating the shutdown code to recognize a new resetting state to avoid errors if unusual state transitions occur again.
How can this vulnerability impact me? :
This vulnerability can cause RDS connections in the Linux kernel to get stuck in an inconsistent state during error handling. Specifically, the connection handling code may fail to properly shut down connections, leaving shutdown work queued indefinitely. This can lead to resource leaks, degraded network performance, or instability in applications relying on RDS connections.