Linux Kernel RxRPC: Response Only During Service Challenge Vulnerability
CVE-2026-31676 Published on April 25, 2026
rxrpc: only handle RESPONSE during service challenge
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: only handle RESPONSE during service challenge
Only process RESPONSE packets while the service connection is still in
RXRPC_CONN_SERVICE_CHALLENGING. Check that state under state_lock before
running response verification and security initialization, then use a local
secured flag to decide whether to queue the secured-connection work after
the state transition. This keeps duplicate or late RESPONSE packets from
re-running the setup path and removes the unlocked post-transition state
test.
Products Associated with CVE-2026-31676
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version 17926a79320afa9b95df6b977b40cca6d8713cea and below d0035e634dae83237ab7f5681eb52b2f65d0ceb8 is affected.
- Version 17926a79320afa9b95df6b977b40cca6d8713cea and below 03fd2ef73cb4ffd0af100a95b634af54f474414e is affected.
- Version 17926a79320afa9b95df6b977b40cca6d8713cea and below c43ffdcfdbb5567b1f143556df8a04b4eeea041c is affected.
- Version 2.6.22 is affected.
- Before 2.6.22 is unaffected.
- Version 6.18.23, <= 6.18.* is unaffected.
- Version 6.19.13, <= 6.19.* is unaffected.
- Version 7.0, <= * is unaffected.