Bug 2461520 (CVE-2026-31633) - CVE-2026-31633 kernel: rxrpc: Fix integer overflow in rxgk_verify_response()
Summary: CVE-2026-31633 kernel: rxrpc: Fix integer overflow in rxgk_verify_response()
Keywords:
Status: NEW
Alias: CVE-2026-31633
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-24 15:06 UTC by OSIDB Bzimport
Modified: 2026-04-24 21:02 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-24 15:06:17 UTC
In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix integer overflow in rxgk_verify_response()

In rxgk_verify_response(), there's a potential integer overflow due to
rounding up token_len before checking it, thereby allowing the length check to
be bypassed.

Fix this by checking the unrounded value against len too (len is limited as
the response must fit in a single UDP packet).


Note You need to log in before you can comment on or make changes to this bug.